Kaspersky ID:
KLA11299
Detekováno:
08/06/2018
Aktualizováno:
01/28/2026

Popis

Multiple serious vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A buffer overflow vulnerability can be exploited remotely to cause denial of service;
  2. Multiple use-after-free vulnerabilities can be exploited remotely to cause denial of service;
  3. An integer overflow vulnerability in SwizzleData can be exploited remotely to cause denial of service;
  4. An integer overflow vulnerability in SSSE3 scaler can be exploited remotely to cause denial of service;
  5. A type confusion vulnerability can be exploited remotely to cause denial of service;
  6. A CORS bypass vulnerability in NPAPI plugins can be exploited remotely to bypass security restrictions;
  7. Multiple unspecified vulnerabilities can be exploited locally to obtain sensitive information;
  8. An integer overflow vulnerability in Skia scaler can be exploited remotely to cause denial of service.

Oficiální doporučení

Vykořisťování

Public exploits exist for this vulnerability.

Související produkty

seznam CVE

  • CVE-2018-12359
    critical
  • CVE-2018-12360
    critical
  • CVE-2018-12361
    critical
  • CVE-2018-12362
    critical
  • CVE-2018-12363
    critical
  • CVE-2018-12364
    critical
  • CVE-2018-12365
    high
  • CVE-2018-12366
    high
  • CVE-2018-12367
    warning
  • CVE-2018-12368
    critical
  • CVE-2018-12371
    critical
  • CVE-2018-5156
    critical
  • CVE-2018-5187
    critical
  • CVE-2018-5188
    critical

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.