There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
[
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "125",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "115.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "115.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
bugzilla.mozilla.org/show_bug.cgi?id=1881183
kb.cert.org/vuls/id/421644
lists.debian.org/debian-lts-announce/2024/04/msg00012.html
lists.debian.org/debian-lts-announce/2024/04/msg00013.html
www.mozilla.org/security/advisories/mfsa2024-18/
www.mozilla.org/security/advisories/mfsa2024-19/
www.mozilla.org/security/advisories/mfsa2024-20/