Vulnerability Description
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.5 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Mozilla | Firefox | < 62.0.2 |
| Mozilla | Firefox Esr | < 60.2.1 |
| Mozilla | Thunderbird | < 60.2.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105380Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041700Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041701Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:2834Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2835Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3403Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3458Third Party Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585Issue TrackingPermissions RequiredVendor Advisory
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201810-01Third Party Advisory
- https://security.gentoo.org/glsa/201811-13Third Party Advisory
- https://usn.ubuntu.com/3778-1/Third Party Advisory
- https://usn.ubuntu.com/3793-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4304Third Party Advisory
- https://www.debian.org/security/2018/dsa-4327Third Party Advisory
FAQ
What is CVE-2018-12385?
CVE-2018-12385 is a vulnerability with a CVSS score of 7.0 (HIGH). A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination wi...
How severe is CVE-2018-12385?
CVE-2018-12385 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12385?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server Eus, Redhat Enterprise Linux Server Tus.