A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1605-1 | firefox-esr security update |
Debian DSA |
DSA-4354-1 | firefox-esr security update |
EUVD |
EUVD-2018-10223 | A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64. |
Ubuntu USN |
USN-3844-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-3868-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-05T11:08:21.886Z
Reserved: 2018-10-19T00:00:00
Link: CVE-2018-18498
No data.
Status : Modified
Published: 2019-02-28T18:29:01.853
Modified: 2024-11-21T03:56:03.143
Link: CVE-2018-18498
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN