Vulnerability Description
A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.5 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Mozilla | Firefox | < 61.0 |
| Mozilla | Firefox Esr | < 52.9 |
| Mozilla | Thunderbird | < 52.9 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104560Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041193Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:2112Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2113Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2251Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2252Third Party Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206Issue TrackingPermissions RequiredVendor Advisory
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201810-01Third Party Advisory
- https://security.gentoo.org/glsa/201811-13Third Party Advisory
- https://usn.ubuntu.com/3705-1/Third Party Advisory
- https://usn.ubuntu.com/3714-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4235Third Party Advisory
- https://www.debian.org/security/2018/dsa-4244Third Party Advisory
FAQ
What is CVE-2018-12365?
CVE-2018-12365 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private lo...
How severe is CVE-2018-12365?
CVE-2018-12365 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12365?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server Eus, Redhat Enterprise Linux Server Tus.