CVE-2018-5130Improper Input Validation in Mozilla Firefox

Severity
8.8HIGHNVD
EPSS
1.2%
top 21.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateMay 14

Description

When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages7 packages

CVEListV5mozilla/firefoxunspecified59
NVDmozilla/firefox< 52.7.0+1
CVEListV5mozilla/firefox_esrunspecified52.7
Ubuntumozilla/firefox< 59.0+build5-0ubuntu0.14.04.1+3

Also affects: Debian Linux 7.0, 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 17.10, Enterprise Linux 7.4, 7.5

🔴Vulnerability Details

5
GHSA
GHSA-w9cf-85vm-mch5: When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered2022-05-14
CVEList
CVE-2018-5130: When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered2018-06-11
OSV
CVE-2018-5130: When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered2018-06-11
OSV
firefox regression2018-04-06
OSV
firefox vulnerabilities2018-03-14

📋Vendor Advisories

4
Ubuntu
Firefox regression2018-04-06
Ubuntu
Firefox vulnerabilities2018-03-14
Red Hat
Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07)2018-03-14
Debian
CVE-2018-5130: firefox - When packets with a mismatched RTP payload type are sent in WebRTC connections, ...2018

💬Community

1
Bugzilla
CVE-2018-5130 Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07)2018-03-14
CVE-2018-5130 — Improper Input Validation in Mozilla | cvebase