When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Debian DLA | 
                DLA-3319-1 | firefox-esr security update | 
  Debian DLA | 
                DLA-3324-1 | thunderbird security update | 
  Debian DSA | 
                DSA-5350-1 | firefox-esr security update | 
  Debian DSA | 
                DSA-5355-1 | thunderbird security update | 
  EUVD | 
                EUVD-2023-29639 | When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. | 
  Ubuntu USN | 
                USN-5880-1 | Firefox vulnerabilities | 
  Ubuntu USN | 
                USN-5943-1 | Thunderbird vulnerabilities | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Thu, 09 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-01-09T21:12:17.935Z
Reserved: 2023-02-13T00:00:00
Link: CVE-2023-25732
Updated: 2024-08-02T11:32:11.641Z
Status : Modified
Published: 2023-06-02T17:15:11.193
Modified: 2025-01-09T21:15:21.253
Link: CVE-2023-25732
                        OpenCVE Enrichment
                    No data.
 Debian DLA
 Debian DSA
 EUVD
 Ubuntu USN