Description
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References (20)
Core 20
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201810-01
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2018-15/
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2112
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201811-13
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4235
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2018-18/
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2113
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2018-16/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4244
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/104560
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1041193
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2018-19/
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2252
Vendor Advisory x_refsource_confirm
https://www.mozilla.org/security/advisories/mfsa2018-17/
Issue Tracking, Permissions Required, Vendor Advisory x_refsource_confirm
https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2251
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3705-1/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3714-1/
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
Scores
CVSS v3
6.5
EPSS
0.0102
EPSS Percentile
77.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
CWE
CWE-125
Status
published
Products (19)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
17.10
canonical/ubuntu_linux
18.04
debian/debian_linux
8.0
debian/debian_linux
9.0
mozilla/firefox
< 61.0
mozilla/firefox_esr
< 52.9
mozilla/thunderbird
< 52.9
redhat/enterprise_linux_desktop
6.0
... and 9 more
Published
Oct 18, 2018
Tracked Since
Feb 18, 2026