Impact
Memory safety bugs in Firefox 135 and Thunderbird 135, including buffer copy without bounding checks (CWE-120) and buffer overflows (CWE-122), caused memory corruption and could, with enough effort, allow an attacker to execute arbitrary code. The vulnerable code could corrupt internal data structures leading to execution of injected instructions.
Affected Systems
The affected products are Mozilla Firefox and Mozilla Thunderbird, specifically the 135 releases. Versions 136 and later contain the fixes that eliminate the exploitable bugs.
Risk and Exploitability
The CVSS score of 8.2 classifies this vulnerability as high risk. The EPSS score of less than 1% indicates a low current probability of exploitation, but the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is inferred to be remote, potentially via malicious web or email content that the affected browsers process. The exploitation would grant the attacker arbitrary code execution and compromise the confidentiality, integrity, and availability of the victim’s system.
OpenCVE Enrichment
EUVD
Ubuntu USN