Mozilla Foundation Security Advisory 2018-07

Security vulnerabilities fixed in Firefox ESR 52.7

Announced
March 13, 2018
Impact
critical
Products
Firefox ESR
Fixed in
  • Firefox ESR 52.7

#CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList

Reporter
Nils
Impact
high
Description

A buffer overflow can occur when manipulating the SVG animatedPathSegList through script. This results in a potentially exploitable crash.

References

#CVE-2018-5129: Out-of-bounds write with malformed IPC messages

Reporter
James Grant
Impact
high
Description

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process.

References

#CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption

Reporter
Tony Paloma
Impact
high
Description

When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered.

References

#CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources

Reporter
Ben Kelly
Impact
moderate
Description

Under certain circumstances the fetch() API can return transient local copies of resources that were sent with a no-store or no-cache cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing.

References

#CVE-2018-5144: Integer overflow during Unicode conversion

Reporter
Root Object
Impact
moderate
Description

An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter.

References

#CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7

Reporter
Mozilla developers and community
Impact
critical
Description

Mozilla developers and community members Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, and Philipp reported memory safety bugs present in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

References

#CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7

Reporter
Mozilla developers and community
Impact
critical
Description

Mozilla developers Jet Villegas and Randell Jesup reported memory safety bugs present in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

References