In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3521-1 | thunderbird security update |
Debian DLA |
DLA-3523-1 | firefox-esr security update |
Debian DSA |
DSA-5464-1 | firefox-esr security update |
Debian DSA |
DSA-5469-1 | thunderbird security update |
EUVD |
EUVD-2023-53941 | In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1. |
Ubuntu USN |
USN-6267-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-6333-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 22 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilla firefox Esr
|
|
| CPEs | cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Mozilla firefox Esr
|
|
| Metrics |
ssvc
|
Mon, 21 Oct 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Mozilla firefox Esr
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-02-13T17:08:27.405Z
Reserved: 2023-08-01T14:58:10.910Z
Link: CVE-2023-4050
Updated: 2024-08-02T07:17:12.069Z
Status : Modified
Published: 2023-08-01T15:15:10.090
Modified: 2024-11-21T08:34:18.070
Link: CVE-2023-4050
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN