CVE-2024-0755

Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:47

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - Issue Tracking, Permissions Required () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - Issue Tracking, Permissions Required
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - Mailing List, Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-01/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2024-01/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-02/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2024-02/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-04/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2024-04/ - Vendor Advisory

18 Oct 2024, 16:35

Type Values Removed Values Added
CWE CWE-94

02 Feb 2024, 17:14

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html - Mailing List, Third Party Advisory

31 Jan 2024, 16:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html -

29 Jan 2024, 22:47

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE NVD-CWE-noinfo
First Time Debian debian Linux
Mozilla
Mozilla firefox Esr
Mozilla thunderbird
Debian
Mozilla firefox
References () https://www.mozilla.org/security/advisories/mfsa2024-01/ - () https://www.mozilla.org/security/advisories/mfsa2024-01/ - Vendor Advisory
References () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 - Issue Tracking, Permissions Required
References () https://www.mozilla.org/security/advisories/mfsa2024-02/ - () https://www.mozilla.org/security/advisories/mfsa2024-02/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-04/ - () https://www.mozilla.org/security/advisories/mfsa2024-04/ - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - Mailing List, Third Party Advisory

25 Jan 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html -

23 Jan 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-23 14:15

Updated : 2024-11-21 08:47


NVD link : CVE-2024-0755

Mitre link : CVE-2024-0755

CVE.ORG link : CVE-2024-0755


JSON object : View

Products Affected

debian

  • debian_linux

mozilla

  • thunderbird
  • firefox_esr
  • firefox
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')