When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3364-1 firefox-esr security update
Debian DLA Debian DLA DLA-3365-1 thunderbird security update
Debian DSA Debian DSA DSA-5374-1 firefox-esr security update
Debian DSA Debian DSA DSA-5375-1 thunderbird security update
EUVD EUVD EUVD-2023-29659 When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
Ubuntu USN Ubuntu USN USN-5954-1 Firefox vulnerabilities
Ubuntu USN Ubuntu USN USN-5972-1 Thunderbird vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 09 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2025-01-09T16:08:24.910Z

Reserved: 2023-02-13T00:00:00

Link: CVE-2023-25752

cve-icon Vulnrichment

Updated: 2024-08-02T11:32:12.593Z

cve-icon NVD

Status : Modified

Published: 2023-06-02T17:15:11.990

Modified: 2024-11-21T07:50:04.787

Link: CVE-2023-25752

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-03-14T00:00:00Z

Links: CVE-2023-25752 - Bugzilla

cve-icon OpenCVE Enrichment

No data.