Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1193389 | Issue Tracking | 
| https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html | Mailing List | 
| https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html | Mailing List | 
| https://www.mozilla.org/security/advisories/mfsa2024-18/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2024-26/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2024-28/ | Vendor Advisory | 
| https://bugzilla.mozilla.org/show_bug.cgi?id=1193389 | Issue Tracking | 
| https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html | Mailing List | 
| https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html | Mailing List | 
| https://www.mozilla.org/security/advisories/mfsa2024-18/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2024-26/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2024-28/ | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    04 Apr 2025, 14:41
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1193389 - Issue Tracking | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html - Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html - Mailing List | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-18/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-26/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-28/ - Vendor Advisory | |
| CPE | cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*  | 
|
| First Time | 
        
        Mozilla firefox
         Mozilla thunderbird Mozilla  | 
21 Nov 2024, 09:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1193389 - | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html - | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html - | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-18/ - | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-26/ - | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-28/ - | 
12 Aug 2024, 17:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.5  | 
| CWE | CWE-416 | 
19 Jun 2024, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
13 Jun 2024, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12. | |
| References | 
        
        
  | 
13 Jun 2024, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| Summary | 
        
        
  | 
11 Jun 2024, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-06-11 13:15
Updated : 2025-04-04 14:41
NVD link : CVE-2024-5702
Mitre link : CVE-2024-5702
CVE.ORG link : CVE-2024-5702
JSON object : View
Products Affected
                mozilla
- thunderbird
 - firefox
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
