Impact
A miscompilation in Firefox and Thunderbird’s JavaScript engine JIT component creates a use‑after‑free condition (CWE‑416). When an attacker can cause the miscompiled code to run, the freed memory can be accessed or overwritten, allowing arbitrary machine instructions to be executed inside the affected process. This can lead to full takeover of the browser or mail client, leaking or tampering with data and potentially disrupting system availability.
Affected Systems
Mozilla Firefox versions prior to 148, Firefox ESR 115.33 and 140.8, and Mozilla Thunderbird versions prior to 148 and 140.8 are affected.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.8, indicating high severity. The EPSS score is below 1 %, suggesting a low current probability of exploitation, but the potential impact remains serious. It has not been listed in CISA’s KEV catalog. Exploitation would most likely occur through malicious JavaScript executed in a web page or other scriptable context, providing remote attackers with a path to memory corruption and code execution if the conditions for the miscompilation are met.
OpenCVE Enrichment
Debian DLA
Debian DSA