When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3364-1 | firefox-esr security update |
Debian DLA |
DLA-3365-1 | thunderbird security update |
Debian DSA |
DSA-5374-1 | firefox-esr security update |
Debian DSA |
DSA-5375-1 | thunderbird security update |
EUVD |
EUVD-2023-29659 | When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. |
Ubuntu USN |
USN-5954-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-5972-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-01-09T16:08:24.910Z
Reserved: 2023-02-13T00:00:00
Link: CVE-2023-25752
Updated: 2024-08-02T11:32:12.593Z
Status : Modified
Published: 2023-06-02T17:15:11.990
Modified: 2024-11-21T07:50:04.787
Link: CVE-2023-25752
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN