Lucene search

K
mozillaMozilla FoundationMFSA2024-13
HistoryMar 19, 2024 - 12:00 a.m.

Security Vulnerabilities fixed in Firefox ESR 115.9 — Mozilla

2024-03-1900:00:00
Mozilla Foundation
www.mozilla.org
21
tls
windows error reporter
sandbox escape
armv7-a
integer overflow
out-of-memory
timing side-channel attack
rsa decryption
markup injection
nonce theft
pointer lock
memory safety bugs

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.0%

An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.
An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. Note: This issue only affected Windows operating systems. Other operating systems are unaffected.
Return registers were overwritten which could have allowed an attacker to execute arbitrary code. Note: This issue only affected Armv7-A systems. Other operating systems are unaffected.
AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.
To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue.
NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data.
Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.
A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.
If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.
Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Affected configurations

Vulners
Node
mozillafirefox_esrRange<115.9
CPENameOperatorVersion
firefox esrlt115.9

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.0%