A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2018-12385 from the MITRE CVE dictionary dictionary and NIST NVD.
This flaw cannot be exploited through email in Thunderbird as scripting is disabled in this for email content. It may be possible to exploit through Feeds (Atom or RSS) or other browser-like contexts.
CVSS3 Base Score | 6.1 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | None |
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (thunderbird) | RHSA-2018:3458 | 2018-11-05 |
Red Hat Enterprise Linux 7 (firefox) | RHSA-2018:2835 | 2018-09-27 |
Red Hat Enterprise Linux 6 (firefox) | RHSA-2018:2834 | 2018-09-27 |
Red Hat Enterprise Linux 6 (thunderbird) | RHSA-2018:3403 | 2018-10-30 |