Impact
A vulnerable heap operation in the libvpx media decoding library allows an attacker to write beyond the intended buffer boundaries. This overflow can corrupt adjacent memory structures, leading to arbitrary code execution or a complete crash. The weakness is a classic Out‑of‑Bounds Write (CWE‑122), which can compromise confidentiality, integrity, and availability if exploited.
Affected Systems
The affected products are Mozilla Firefox and Mozilla Thunderbird. Versions prior to Firefox 147.0.4, Firefox ESR 140.7.1, Firefox ESR 115.32.1, Thunderbird 140.7.2, and Thunderbird 147.0.2 are vulnerable. All releases newer than these contain the patch.
Risk and Exploitability
The CVSS score of 8.8 classifies this vulnerability as high severity. The EPSS probability is less than 1%, indicating a low likelihood of exploitation at this time, and it is not listed in the CISA KEV catalog. The attack vector is inferred to involve a maliciously crafted VPX media file delivered through a web page or email, as libvpx is used to decode such content in browsers and mail clients.
OpenCVE Enrichment
Debian DLA
Debian DSA