If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox < 60.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/104139 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1040896 | Third Party Advisory VDB Entry | 
| https://bugzilla.mozilla.org/show_bug.cgi?id=1436809 | Issue Tracking Permissions Required | 
| https://usn.ubuntu.com/3645-1/ | Third Party Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2018-11/ | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2018-06-11 21:29
Updated : 2018-08-14 16:32
NVD link : CVE-2018-5153
Mitre link : CVE-2018-5153
CVE.ORG link : CVE-2018-5153
JSON object : View
Products Affected
                canonical
- ubuntu_linux
 
mozilla
- firefox
 
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
