Integer Overflow or Wraparound The advisory has been revoked - it doesn't affect any version of package MozillaFirefox-branding-upstream  (opens in a new tab)


Threat Intelligence

EPSS
3.39% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES150-MOZILLAFIREFOXBRANDINGUPSTREAM-2758865
  • published14 Apr 2022
  • disclosed7 Nov 2018

Introduced: 7 Nov 2018

CVE-2018-12393  (opens in a new tab)
CWE-190  (opens in a new tab)
CWE-787  (opens in a new tab)

Amendment

The SLES security team deemed this advisory irrelevant for SLES:15.0.

NVD Description

Note: Versions mentioned in the description apply only to the upstream MozillaFirefox-branding-upstream package and not the MozillaFirefox-branding-upstream package as distributed by SLES.

A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. Note: 64-bit builds are not vulnerable to this issue.. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.