PT-2023-5702 · Microsoft +4 · Windows +6
Ronald Crane
·
Published
2023-09-26
·
Updated
2024-12-12
·
CVE-2023-5174
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Firefox versions prior to 118
Firefox ESR versions prior to 115.3
Thunderbird versions prior to 115.3
Description:
The issue is related to the use of memory after it has been freed, which can lead to a potentially exploitable crash. This occurs when Windows fails to duplicate a handle during process creation, and the sandbox code inadvertently frees a pointer twice. The bug only affects Firefox on Windows when run in non-standard configurations, such as using `runas`. Other operating systems are unaffected.
Recommendations:
For Firefox versions prior to 118, update to version 118 or later.
For Firefox ESR versions prior to 115.3, update to version 115.3 or later.
For Thunderbird versions prior to 115.3, update to version 115.3 or later.
As a temporary workaround, consider avoiding the use of non-standard configurations, such as running Firefox with `runas`, until the issue is resolved.
Exploit
Fix
Use After Free
Weakness Enumeration
Related Identifiers
Affected Products
References · 2420
- 🔥 https://github.com/mistymntncop/CVE-2023-4863⭐ 313 🔗 48 · Exploit
- 🔥 https://github.com/LiveOverflow/webp-CVE-2023-4863⭐ 48 🔗 7 · Exploit
- 🔥 https://github.com/UT-Security/cve-2023-5217-poc⭐ 15 🔗 5 · Exploit
- 🔥 https://github.com/wrv/cve-2023-5217-poc⭐ 15 🔗 5 · Exploit
- 🔥 https://github.com/bbaranoff/CVE-2023-4863⭐ 6 🔗 1 · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/705057 · Security Note
- https://bdu.fstec.ru/vul/2022-06518 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/704112 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882 · Security Note
- https://bdu.fstec.ru/vul/2022-05560 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32210 · Security Note