← Voltar para CVEs
CVE-2018-5095
N/ADescricao
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado6/11/2018
Ultima modificacao11/25/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxmozilla:firefoxmozilla:thunderbirdredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstation
Fraquezas (CWE)
CWE-190CWE-908
Referencias
http://www.securityfocus.com/bid/102783(security@mozilla.org)
http://www.securitytracker.com/id/1040270(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2018:0122(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2018:0262(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1418447(security@mozilla.org)
https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html(security@mozilla.org)
https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html(security@mozilla.org)
https://usn.ubuntu.com/3544-1/(security@mozilla.org)
https://www.debian.org/security/2018/dsa-4096(security@mozilla.org)
https://www.debian.org/security/2018/dsa-4102(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2018-02/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2018-03/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2018-04/(security@mozilla.org)
http://www.securityfocus.com/bid/102783(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040270(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0122(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0262(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1418447(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3544-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4096(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4102(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2018-02/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2018-03/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2018-04/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.