When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
History

Thu, 19 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published: 2023-09-11T08:01:17.333Z

Updated: 2024-09-19T20:02:19.081Z

Reserved: 2023-08-29T03:36:49.709Z

Link: CVE-2023-4578

cve-icon Vulnrichment

Updated: 2024-08-02T07:31:06.622Z

cve-icon NVD

Status : Analyzed

Published: 2023-09-11T09:15:09.347

Modified: 2023-09-14T03:53:09.187

Link: CVE-2023-4578

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-08-29T00:00:00Z

Links: CVE-2023-4578 - Bugzilla