Description
Incorrect boundary conditions in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Published: 2026-02-24
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Incorrect boundary conditions in the Networking: JAR component allow an attacker to manipulate the parsing of JAR files, causing a buffer overflow that can lead to arbitrary code execution. The vulnerability stems from a lack of proper bounds checking (CWE-119). If exploited, the attacker could gain full control over the affected process, compromising confidentiality, integrity, and availability of the system.

Affected Systems

Mozilla distributes the affected code in both Firefox and Thunderbird. The bug was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird ESR 140.8. Therefore, any installations of Firefox or Thunderbird older than those releases are vulnerable. This includes all current standard releases and any ESR branches released prior to those numbers.

Risk and Exploitability

The CVSS score of 9.8 classifies the issue as critical, and the EPSS score is reported as <1%, indicating that publicly known exploitation attempts are currently rare, but the high severity warrants prompt action. The vulnerability does not appear in the CISA KEV catalog, but the lack of known exploits does not mitigate the risk of future attacks. The likely attack path involves supplying a crafted JAR file to a user, who then opens it, triggering the overflow. Therefore, the risk escalates in environments where JAR files are downloaded and processed without additional validation.

Generated by OpenCVE AI on April 15, 2026 at 16:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Firefox 148 or newer, Firefox ESR 140.8 or newer, and to Thunderbird 148 or Thunderbird ESR 140.8 or newer. This is the official fix.
  • If an update cannot be performed immediately, disable the JAR protocol handler for untrusted content by setting the network.protocol-handler.warnOrBlock.jar preference to true, which prompts or blocks JAR downloads.
  • Enable automatic updates and set the update channel to security‑critical mode so that future patches are applied without manual intervention.

Generated by OpenCVE AI on April 15, 2026 at 16:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4495-1 thunderbird security update
Debian DLA Debian DLA DLA-4496-1 firefox-esr security update
Debian DSA Debian DSA DSA-6148-1 firefox-esr security update
Debian DSA Debian DSA DSA-6152-1 thunderbird security update
History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8. Incorrect boundary conditions in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mon, 02 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 28 Feb 2026 04:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Wed, 25 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Mozilla firefox Esr
Mozilla thunderbird
Vendors & Products Mozilla
Mozilla firefox
Mozilla firefox Esr
Mozilla thunderbird

Wed, 25 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

threat_severity

Moderate


Tue, 24 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8. Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
References

Tue, 24 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Title Incorrect boundary conditions in the Networking: JAR component
References

Subscriptions

Mozilla Firefox Firefox Esr Thunderbird
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-16T14:32:33.729Z

Reserved: 2026-02-19T15:06:08.909Z

Link: CVE-2026-2779

cve-icon Vulnrichment

Updated: 2026-02-28T03:15:36.492Z

cve-icon NVD

Status : Modified

Published: 2026-02-24T14:16:26.330

Modified: 2026-04-13T15:17:25.303

Link: CVE-2026-2779

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-24T13:33:14Z

Links: CVE-2026-2779 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:15:10Z

Weaknesses