![]() Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. #CVE-2023-4056: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Reporter Dianna Smith, Ryan VanderMeulen, Timothy Nikkel, and the Mozilla Fuzzing Team Impact high Description This could have caused requests to be sent with some cookies missing. When the number of cookies per domain was exceeded in okie, the actual cookie jar sent to the host was no longer consistent with expected cookie jar state. #CVE-2023-4055: Cookie jar overflow caused unexpected cookie jar state Reporter Marco Squarcina Impact low Description This bug only affects Firefox on Windows. When opening appref-ms files, Firefox did not warn the user that these files may contain malicious code. #CVE-2023-4054: Lack of warning when opening appref-ms files Reporter P Umar Farooq Impact moderate Description This resulted in a potentially exploitable crash which could have led to a sandbox escape. In some cases, an untrusted input stream was copied to a stack buffer without checking its size. #CVE-2023-4050: Stack buffer overflow in StorageManager Reporter Mark Brand Impact high Description These could have resulted in potentially exploitable use-after-free vulnerabilities. Race conditions in reference counting code were found through code inspection. #CVE-2023-4049: Fix potential race conditions when releasing platform objects Reporter Nika Layzell Impact high Description #CVE-2023-4048: Crash in DOMParser due to out-of-memory conditions Reporter Irvan Kurniawan Impact high DescriptionĪn out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. #CVE-2023-4047: Potential permissions request bypass via clickjacking Reporter Axel Chong Impact high DescriptionĪ bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This resulted in incorrect compilation and a potentially exploitable crash in the content process. In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. #CVE-2023-4046: Incorrect value used during WASM compilation Reporter Alexander Guryanov Impact high Description Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. #CVE-2023-4045: Offscreen Canvas could have bypassed cross-origin restrictions Reporter Max Vlasov Impact high Description In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. Mozilla Foundation Security Advisory 2023-32 Security Vulnerabilities fixed in Thunderbird 102.14 Announced AugImpact high Products Thunderbird Fixed in
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |