Mozilla Foundation Security Advisory 2018-31

Security vulnerabilities fixed in Thunderbird 60.4

Announced
December 21, 2018
Impact
critical
Products
Thunderbird
Fixed in
  • Thunderbird 60.4

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

#CVE-2018-17466: Buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11

Reporter
Omair
Impact
high
Description

A buffer overflow and out-of-bounds read can occur in TextureStorage11 within the ANGLE graphics library, used for WebGL content. This results in a potentially exploitable crash.

References

#CVE-2018-18492: Use-after-free with select element

Reporter
Nils
Impact
high
Description

A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash.

References

#CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia

Reporter
Atte Kettunen
Impact
high
Description

A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash.

References

#CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs

Reporter
James Lee of Kryptos Logic
Impact
high
Description

A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft.

References

#CVE-2018-18498: Integer overflow when calculating buffer sizes for images

Reporter
R at Zero Day LLC
Impact
low
Description

A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write.

References

#CVE-2018-12405: Memory safety bugs fixed in Firefox 64, Firefox ESR 60.4, and Thunderbird 60.4

Reporter
Mozilla developers and community
Impact
critical
Description

Mozilla developers and community members Christian Holler, Diego Calleja, Andrew McCreight, Jon Coppeard, Jed Davis, Natalia Csoregi, Nicolas B. Pierron, and Tyson Smith reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

References