-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT Security Bulletin
Mozilla Foundation Security Advisory 2018-17
27 June 2018
AusCERT Security Bulletin Summary
Product: Mozilla Firefox ESR
Operating System: UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Cross-site Request Forgery -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Access Confidential Data -- Remote with User Interaction
Reduced Security -- Remote with User Interaction
CVE Names: CVE-2018-12368 CVE-2018-12366 CVE-2018-12365
CVE-2018-12364 CVE-2018-12363 CVE-2018-12362
CVE-2018-12360 CVE-2018-12359 CVE-2018-5188
Member content until: Friday, July 27 2018
Multiple vulnerabilities have been identified in Mozilla Firefox ESR
prior to version 52.9. 
The vendor has provided the following information about the
"CVE-2018-12359: Buffer overflow using computed size of canvas element
A buffer overflow can occur when rendering canvas content while
adjusting the height and width of the <canvas> element dynamically,
causing data to be written outside of the currently computed
boundaries. This results in a potentially exploitable crash.
#CVE-2018-12360: Use-after-free when using focus()
A use-after-free vulnerability can occur when deleting an input
element during a mutation event handler triggered by focusing that
element. This results in a potentially exploitable crash.
#CVE-2018-12362: Integer overflow in SSSE3 scaler
F. Alonso (revskills)
An integer overflow can occur during graphics operations done by the
Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in
a potentially exploitable crash.
#CVE-2018-5156: Media recorder segmentation fault when track type is
changed during capture
A vulnerability can occur when capturing a media stream when the media
source type is changed as the capture is occuring. This can result in
stream data being cast to the wrong type causing a potentially
#CVE-2018-12363: Use-after-free when appending DOM nodes
A use-after-free vulnerability can occur when script uses mutation
events to move DOM nodes between documents, resulting in the old node
that held the node being freed but the node still having a pointer
referencing it. This results in a potentially exploitable crash.
#CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin
requests, bypassing CORS by making a same-origin POST that does a 307
redirect to the target site. This allows for a malicious site to
engage in cross-site request forgery (CSRF) attacks.
#CVE-2018-12365: Compromised IPC child process can list local
A compromised IPC child process can escape the content sandbox and
list the names of arbitrary files on the file system without user
consent or interaction. This could result in exposure of private local
#CVE-2018-12366: Invalid data handling during QCMS transformations
An invalid grid size during QCMS (color profile) transformations can
result in the out-of-bounds read interpreted as a float value. This
could leak private data into the output.
#CVE-2018-12368: No warning when opening executable SettingContent-ms
Windows 10 does not warn users before opening executable files with
the SettingContent-ms extension even when they have been downloaded
from the internet and have the "Mark of the Web." Without the warning,
unsuspecting users unfamiliar with this new file type might run an
unwanted executable. This also allows a WebExtension with the limited
downloads.open permission to execute arbitrary code without user
interaction on Windows 10 systems
Note: this issue only affects Windows operating systems. Other
operating systems are unaffected.
The Tale of SettingContent-ms Files
#CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR
60.1, and Firefox ESR 52.9
Mozilla developers and community
Mozilla developers and community members Alex Gaynor, Christoph Diehl,
Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B.
Pierron, Jason Kratzer, Marcia Knous, and Ronald Crane reported memory
safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR
52.8. Some of these bugs showed evidence of memory corruption and we
presume that with enough effort that some of these could be exploited
to run arbitrary code.
Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox
ESR 52.9" 
Users are advised to update to Firefox ESR version 52.9 to address these
 Mozilla Foundation Security Advisory 2018-17
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----