CVE-2023-6856

The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1843782 - Issue Tracking, Permissions Required () https://bugzilla.mozilla.org/show_bug.cgi?id=1843782 - Issue Tracking, Permissions Required
References () https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202401-10 - Third Party Advisory () https://security.gentoo.org/glsa/202401-10 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5581 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5581 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5582 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5582 - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2023-54/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2023-54/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2023-55/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2023-55/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2023-56/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2023-56/ - Vendor Advisory

02 Feb 2024, 02:31

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References () https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html - () https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202401-10 - () https://security.gentoo.org/glsa/202401-10 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html - () https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html - Mailing List, Third Party Advisory

07 Jan 2024, 11:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-10 -

29 Dec 2023, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html -
  • () https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html -

22 Dec 2023, 11:10

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1843782 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1843782 - Issue Tracking, Permissions Required
References () https://www.mozilla.org/security/advisories/mfsa2023-56/ - () https://www.mozilla.org/security/advisories/mfsa2023-56/ - Vendor Advisory
References () https://www.debian.org/security/2023/dsa-5581 - () https://www.debian.org/security/2023/dsa-5581 - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2023-55/ - () https://www.mozilla.org/security/advisories/mfsa2023-55/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2023-54/ - () https://www.mozilla.org/security/advisories/mfsa2023-54/ - Vendor Advisory
References () https://www.debian.org/security/2023/dsa-5582 - () https://www.debian.org/security/2023/dsa-5582 - Third Party Advisory
First Time Mozilla firefox Esr
Mozilla
Mozilla thunderbird
Mozilla firefox
Debian debian Linux
Debian
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

22 Dec 2023, 01:15

Type Values Removed Values Added
References
  • () https://www.debian.org/security/2023/dsa-5582 -

21 Dec 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-19 14:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6856

Mitre link : CVE-2023-6856

CVE.ORG link : CVE-2023-6856


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • firefox_esr

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write