CVE-2018-12390

9.8 CRITICAL

📋 TL;DR

This is a critical memory corruption vulnerability in Mozilla Firefox, Firefox ESR, and Thunderbird that could allow attackers to execute arbitrary code on affected systems. The vulnerability affects all users running vulnerable versions of these applications. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Firefox ESR
  • Mozilla Thunderbird
Versions: Firefox < 63, Firefox ESR < 60.3, Thunderbird < 60.3
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Browser/email client crash leading to denial of service, with potential for limited code execution in some scenarios.

🟢

If Mitigated

Application crash without code execution if memory corruption protections are enabled.

🌐 Internet-Facing: HIGH - Web browsers and email clients are directly exposed to internet content.
🏢 Internal Only: MEDIUM - Internal users could be targeted via malicious internal websites or emails.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Memory corruption vulnerabilities require skilled exploitation but can be weaponized once understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 63, Firefox ESR 60.3, Thunderbird 60.3

Vendor Advisory: https://www.mozilla.org/en-US/security/advisories/mfsa2018-26/

Restart Required: Yes

Instructions:

1. Open the application. 2. Click the menu button. 3. Select Help > About Firefox/Thunderbird. 4. The application will check for updates and install them. 5. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript to reduce attack surface while patching

about:config -> javascript.enabled = false

Use alternative browser

all

Switch to a non-vulnerable browser until patching is complete

🧯 If You Can't Patch

  • Network segmentation to restrict vulnerable systems from accessing untrusted content
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check Help > About Firefox/Thunderbird and verify version is below patched versions

Check Version:

firefox --version or thunderbird --version

Verify Fix Applied:

Confirm version is Firefox 63+, Firefox ESR 60.3+, or Thunderbird 60.3+

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs
  • Memory access violation errors
  • Unexpected process termination

Network Indicators:

  • Suspicious JavaScript payloads
  • Unusual outbound connections from browser processes

SIEM Query:

source="firefox.log" AND (event="crash" OR event="segfault")

🔗 References

📤 Share & Export