PT-2023-5702 · Microsoft +4 · Windows +6

Ronald Crane

·

Published

2023-09-26

·

Updated

2024-12-12

·

CVE-2023-5174

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions:

Firefox versions prior to 118

Firefox ESR versions prior to 115.3

Thunderbird versions prior to 115.3

Description:

The issue is related to the use of memory after it has been freed, which can lead to a potentially exploitable crash. This occurs when Windows fails to duplicate a handle during process creation, and the sandbox code inadvertently frees a pointer twice. The bug only affects Firefox on Windows when run in non-standard configurations, such as using `runas`. Other operating systems are unaffected.

Recommendations:

For Firefox versions prior to 118, update to version 118 or later.

For Firefox ESR versions prior to 115.3, update to version 115.3 or later.

For Thunderbird versions prior to 115.3, update to version 115.3 or later.

As a temporary workaround, consider avoiding the use of non-standard configurations, such as running Firefox with `runas`, until the issue is resolved.

Exploit

Fix

Use After Free

Weakness Enumeration

Related Identifiers

ALT-PU-2023-6436
ALT-PU-2024-14035
ALT-PU-2024-3614
ALT-PU-2024-3860
ALT-PU-2024-4241
ALT-PU-2024-4748
BDU:2023-06372
CVE-2023-5174
OPENSUSE-SU-2023_3898-1
OPENSUSE-SU-2023_4016-1
OPENSUSE-SU-2024:13268-1
OPENSUSE-SU-2024:13272-1
OPENSUSE-SU-2024:14572-1
SUSE-SU-2023:3837-1
SUSE-SU-2023:3898-1
SUSE-SU-2023:3899-1
SUSE-SU-2023:4016-1

Affected Products

Alt Linux
Astra Linux
Firefox
Firefox Esr
Suse
Thunderbird
Windows