CVE-2024-0755

Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:47

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - Issue Tracking, Permissions Required () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - Issue Tracking, Permissions Required
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - Mailing List, Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-01/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2024-01/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-02/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2024-02/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-04/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2024-04/ - Vendor Advisory

18 Oct 2024, 16:35

Type Values Removed Values Added
CWE CWE-94

02 Feb 2024, 17:14

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - Mailing List, Third Party Advisory

31 Jan 2024, 16:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html -

29 Jan 2024, 22:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE NVD-CWE-noinfo
First Time Mozilla thunderbird
Debian debian Linux
Mozilla firefox
Mozilla firefox Esr
Mozilla
Debian
CPE cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
References () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - Issue Tracking, Permissions Required
References () https://www.mozilla.org/security/advisories/mfsa2024-04/ - () https://www.mozilla.org/security/advisories/mfsa2024-04/ - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - Mailing List, Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-02/ - () https://www.mozilla.org/security/advisories/mfsa2024-02/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-01/ - () https://www.mozilla.org/security/advisories/mfsa2024-01/ - Vendor Advisory

25 Jan 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html -

23 Jan 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-23 14:15

Updated : 2024-11-21 08:47


NVD link : CVE-2024-0755

Mitre link : CVE-2024-0755

CVE.ORG link : CVE-2024-0755


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • firefox_esr

debian

  • debian_linux
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')