Impact
The vulnerability is triggered when JavaScript processes specially crafted text during segmentation, causing memory corruption that may result in a crash, potentially exploitable. The flaw is a classic buffer overread/write (CWE-119) that can lead to a use-after-free condition (CWE-401).
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected, including all builds prior to Firefox 134 (and ESR 128.6) and Thunderbird 134 (and ESR 128.6). These versions run on various Linux distributions, including Red Hat Enterprise Linux derivatives as noted by the associated CPEs.
Risk and Exploitability
The CVSS score of 7.7 indicates high severity while the EPSS score of less than 1% suggests a low probability of exploitation in the short term. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through malicious or maliciously crafted web content or local files that trigger the vulnerable text segmentation routine; the exact vector is inferred from the description of memory corruption during text processing.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN