Impact
The vulnerability involves memory safety bugs that lead to memory corruption in the Firefox and Thunderbird web browser and mail client. Although the description notes that not all bugs were confirmed for exploitation, it is presumed that with sufficient effort some could allow arbitrary code execution. The weakness is rooted in improper memory handling, as indicated by the included CWE identifiers, and may compromise confidentiality, integrity, or availability of the affected system.
Affected Systems
Mozilla Firefox versions 133 and any preceding releases, Mozilla Firefox ESR 128.5, Mozilla Thunderbird 133, and Mozilla Thunderbird ESR 128.5 are affected. The fixed versions are Firefox 134 and ESR 128.6, and Thunderbird 134 and ESR 128.6. The vulnerability also impacts systems that use these browsers on Red Hat Enterprise Linux 8, 9, and associated extended support channels, as the CPE list indicates compatibility with those platforms.
Risk and Exploitability
The CVSS score of 5.1 places the issue in the medium severity range. The EPSS score of less than 1% indicates that exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires local or privileged access to trigger memory corruption, and the precise exploitation path would need a sufficient payload and conditions to influence the memory of the running browser or mail client.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN