Impact
An attacker can trigger an out-of-bounds read or write on a JavaScript Promise object, a type of memory corruption that may lead to arbitrary code execution. The flaw is classified as CWE-125 (Out‑of‑Bounds Read) and CWE-787 (Out‑of‑Bounds Write). The vulnerability allows an attacker to corrupt memory in the JavaScript engine, potentially compromising confidentiality, integrity, and availability of the affected system if exploited.
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected. The bug was fixed in Firefox 138.0.4, Firefox ESR 128.10.1 and 115.23.1, Thunderbird 128.10.2 and 138.0.2. Older releases of these products, including those packaged in various Red Hat Enterprise Linux channels, remain vulnerable.
Risk and Exploitability
The CVSS score of 9.8 indicates a severe risk level. The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting a low probability of widespread exploitation. The likely attack vector is the execution of maliciously crafted JavaScript, such as via a web page or email content.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN