In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
History

Tue, 22 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla firefox Esr
CPEs cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*
Vendors & Products Mozilla firefox Esr
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 21 Oct 2024 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
Vendors & Products Mozilla firefox Esr

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published: 2023-08-01T14:58:31.812Z

Updated: 2024-10-22T15:05:33.710Z

Reserved: 2023-08-01T14:58:10.910Z

Link: CVE-2023-4050

cve-icon Vulnrichment

Updated: 2024-08-02T07:17:12.069Z

cve-icon NVD

Status : Modified

Published: 2023-08-01T15:15:10.090

Modified: 2024-10-21T19:24:02.230

Link: CVE-2023-4050

cve-icon Redhat

Severity : Important

Publid Date: 2023-08-01T00:00:00Z

Links: CVE-2023-4050 - Bugzilla