Lucene search

K
mozillaMozilla FoundationMFSA2024-12
HistoryMar 19, 2024 - 12:00 a.m.

Security Vulnerabilities fixed in Firefox 124 — Mozilla

2024-03-1900:00:00
Mozilla Foundation
www.mozilla.org
27
firefox
security vulnerabilities
code execution
memory corruption
clickjacking
windows
sandbox
armv7-a
integer overflows
rsa decryption
timing attack
quic
memory safety
thunderbird

9.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.4%

An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. Note: This issue only affected Windows operating systems. Other operating systems are unaffected.
Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values.
Return registers were overwritten which could have allowed an attacker to execute arbitrary code. Note: This issue only affected Armv7-A systems. Other operating systems are unaffected.
AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.
NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data.
The permission prompt input delay could have expired while the window is not in focus, which made the prompt vulnerable to clickjacking by malicious websites.
Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.
A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.
If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.
Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash.
Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Affected configurations

Vulners
Node
mozillafirefoxRange<124
CPENameOperatorVersion
firefoxlt124