CVE-2018-5163

Published Jun 11, 2018

Last updated 3 days ago

Overview

Description
If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.
Source
security@mozilla.org
NVD status
Modified

Risk scores

CVSS 3.0

Type
Primary
Base score
8.1
Impact score
5.9
Exploitability score
2.2
Vector string
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
5.1
Impact score
6.4
Exploitability score
4.9
Vector string
AV:N/AC:H/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-281

Social media

Hype score
Not currently trending

Configurations