CVE-2018-12390
📋 TL;DR
This is a critical memory corruption vulnerability in Mozilla Firefox, Firefox ESR, and Thunderbird that could allow attackers to execute arbitrary code on affected systems. The vulnerability affects all users running vulnerable versions of these applications. Successful exploitation could lead to complete system compromise.
💻 Affected Systems
- Mozilla Firefox
- Mozilla Firefox ESR
- Mozilla Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, and persistent backdoor installation.
Likely Case
Browser/email client crash leading to denial of service, with potential for limited code execution in some scenarios.
If Mitigated
Application crash without code execution if memory corruption protections are enabled.
🎯 Exploit Status
Memory corruption vulnerabilities require skilled exploitation but can be weaponized once understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 63, Firefox ESR 60.3, Thunderbird 60.3
Vendor Advisory: https://www.mozilla.org/en-US/security/advisories/mfsa2018-26/
Restart Required: Yes
Instructions:
1. Open the application. 2. Click the menu button. 3. Select Help > About Firefox/Thunderbird. 4. The application will check for updates and install them. 5. Restart the application when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily disable JavaScript to reduce attack surface while patching
about:config -> javascript.enabled = false
Use alternative browser
allSwitch to a non-vulnerable browser until patching is complete
🧯 If You Can't Patch
- Network segmentation to restrict vulnerable systems from accessing untrusted content
- Implement application whitelisting to prevent execution of unauthorized code
🔍 How to Verify
Check if Vulnerable:
Check Help > About Firefox/Thunderbird and verify version is below patched versions
Check Version:
firefox --version or thunderbird --version
Verify Fix Applied:
Confirm version is Firefox 63+, Firefox ESR 60.3+, or Thunderbird 60.3+
📡 Detection & Monitoring
Log Indicators:
- Application crash logs
- Memory access violation errors
- Unexpected process termination
Network Indicators:
- Suspicious JavaScript payloads
- Unusual outbound connections from browser processes
SIEM Query:
source="firefox.log" AND (event="crash" OR event="segfault")
🔗 References
- http://www.securityfocus.com/bid/105718
- http://www.securityfocus.com/bid/105769
- http://www.securitytracker.com/id/1041944
- https://access.redhat.com/errata/RHSA-2018:3005
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3531
- https://access.redhat.com/errata/RHSA-2018:3532
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-04
- https://security.gentoo.org/glsa/201811-13
- https://usn.ubuntu.com/3801-1/
- https://usn.ubuntu.com/3868-1/
- https://www.debian.org/security/2018/dsa-4324
- https://www.debian.org/security/2018/dsa-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- http://www.securityfocus.com/bid/105718
- http://www.securityfocus.com/bid/105769
- http://www.securitytracker.com/id/1041944
- https://access.redhat.com/errata/RHSA-2018:3005
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3531
- https://access.redhat.com/errata/RHSA-2018:3532
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-04
- https://security.gentoo.org/glsa/201811-13
- https://usn.ubuntu.com/3801-1/
- https://usn.ubuntu.com/3868-1/
- https://www.debian.org/security/2018/dsa-4324
- https://www.debian.org/security/2018/dsa-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/