8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
42.7%
Cross-compartment wrappers wrapping a scripted proxy could have caused
objects from other compartments to be stored in the main compartment
resulting in a use-after-free. This vulnerability affects Firefox < 115,
Firefox ESR < 102.13, and Thunderbird < 102.13.
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
mdeslaur | starting with Ubuntu 22.04, the firefox package is just a script that installs the Firefox snap |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | firefox | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
ubuntu | 22.04 | noarch | mozjs102 | < 102.13.0-0ubuntu0.22.04.1 | UNKNOWN |
ubuntu | 22.10 | noarch | mozjs102 | < 102.13.0-0ubuntu0.22.10.1 | UNKNOWN |
ubuntu | 23.04 | noarch | mozjs102 | < 102.13.0-0ubuntu0.23.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | mozjs38 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | mozjs52 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | mozjs52 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | mozjs68 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | mozjs78 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | mozjs91 | < any | UNKNOWN |
bugzilla.mozilla.org/show_bug.cgi?id=1834711
launchpad.net/bugs/cve/CVE-2023-37202
nvd.nist.gov/vuln/detail/CVE-2023-37202
security-tracker.debian.org/tracker/CVE-2023-37202
ubuntu.com/security/notices/USN-6201-1
ubuntu.com/security/notices/USN-6214-1
ubuntu.com/security/notices/USN-6227-1
www.cve.org/CVERecord?id=CVE-2023-37202
www.mozilla.org/en-US/security/advisories/mfsa2023-22/#CVE-2023-37202
www.mozilla.org/en-US/security/advisories/mfsa2023-23/#CVE-2023-37202
www.mozilla.org/en-US/security/advisories/mfsa2023-24/#CVE-2023-37202
www.mozilla.org/security/advisories/mfsa2023-22/
www.mozilla.org/security/advisories/mfsa2023-23/
www.mozilla.org/security/advisories/mfsa2023-24/