CVE-2018-18506
Publication date 30 January 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | 24.04 LTS noble |
Fixed 65.0+build2-0ubuntu1
|
22.04 LTS jammy |
Fixed 65.0+build2-0ubuntu1
|
|
20.04 LTS focal |
Fixed 65.0+build2-0ubuntu1
|
|
18.04 LTS bionic |
Fixed 65.0+build2-0ubuntu0.18.04.1
|
|
16.04 LTS xenial |
Fixed 65.0+build2-0ubuntu0.16.04.1
|
|
14.04 LTS trusty |
Fixed 65.0+build2-0ubuntu0.14.04.1
|
|
mozjs38 | 24.04 LTS noble | Not in release |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
mozjs52 | 24.04 LTS noble | Not in release |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Ignored | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
mozjs60 | 24.04 LTS noble | Not in release |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
thunderbird | 24.04 LTS noble |
Fixed 60.6.1+build2-0ubuntu1
|
22.04 LTS jammy |
Fixed 60.6.1+build2-0ubuntu1
|
|
20.04 LTS focal |
Fixed 60.6.1+build2-0ubuntu1
|
|
18.04 LTS bionic |
Fixed 1:60.6.1+build2-0ubuntu0.18.04.1
|
|
16.04 LTS xenial |
Fixed 1:60.6.1+build2-0ubuntu0.16.04.1
|
|
14.04 LTS trusty |
Fixed 1:60.6.1+build2-0ubuntu0.14.04.1
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3927-1
- Thunderbird vulnerabilities
- 28 March 2019
- USN-3874-1
- Firefox vulnerabilities
- 30 January 2019