CVE-2018-5163

Publication date 11 May 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.1 · High

Score breakdown

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

Status

Package Ubuntu Release Status
firefox 18.04 LTS bionic
Fixed 60.0+build2-0ubuntu1
17.10 artful
Fixed 60.0+build2-0ubuntu0.17.10.1
16.04 LTS xenial
Fixed 60.0+build2-0ubuntu0.16.04.1
14.04 LTS trusty
Fixed 60.0+build2-0ubuntu0.14.04.1

Severity score breakdown

Parameter Value
Base score 8.1 · High
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

Other references