In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
References
Configurations
History
21 Nov 2024, 08:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1843038 - Issue Tracking, Permissions Required | |
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html - | |
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html - | |
References | () https://www.debian.org/security/2023/dsa-5464 - Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5469 - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2023-29/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2023-30/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2023-31/ - Vendor Advisory |
21 Oct 2024, 19:24
Type | Values Removed | Values Added |
---|---|---|
CPE |
Information
Published : 2023-08-01 15:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4050
Mitre link : CVE-2023-4050
CVE.ORG link : CVE-2023-4050
JSON object : View
Products Affected
debian
- debian_linux
mozilla
- firefox
CWE
CWE-787
Out-of-bounds Write