CVE-2024-6604

Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

04 Apr 2025, 14:42

Type Values Removed Values Added
First Time Mozilla firefox
Mozilla thunderbird
Mozilla
CPE cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
References () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266 - () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266 - Issue Tracking
References () https://www.mozilla.org/security/advisories/mfsa2024-29/ - () https://www.mozilla.org/security/advisories/mfsa2024-29/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-30/ - () https://www.mozilla.org/security/advisories/mfsa2024-30/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-31/ - () https://www.mozilla.org/security/advisories/mfsa2024-31/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-32/ - () https://www.mozilla.org/security/advisories/mfsa2024-32/ - Vendor Advisory

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266 - () https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266 -
References () https://www.mozilla.org/security/advisories/mfsa2024-29/ - () https://www.mozilla.org/security/advisories/mfsa2024-29/ -
References () https://www.mozilla.org/security/advisories/mfsa2024-30/ - () https://www.mozilla.org/security/advisories/mfsa2024-30/ -
References () https://www.mozilla.org/security/advisories/mfsa2024-31/ - () https://www.mozilla.org/security/advisories/mfsa2024-31/ -
References () https://www.mozilla.org/security/advisories/mfsa2024-32/ - () https://www.mozilla.org/security/advisories/mfsa2024-32/ -

12 Nov 2024, 16:35

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

16 Jul 2024, 18:15

Type Values Removed Values Added
Summary
  • (es) Errores de seguridad de la memoria presentes en Firefox 127, Firefox ESR 115.12 y Thunderbird 115.12. Algunos de estos errores mostraron evidencia de corrupción de memoria y suponemos que con suficiente esfuerzo algunos de ellos podrían haberse aprovechado para ejecutar código arbitrario. Esta vulnerabilidad afecta a Firefox &lt; 128 y Firefox ESR &lt; 115.13.
Summary (en) Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 128 and Firefox ESR < 115.13. (en) Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
References
  • () https://www.mozilla.org/security/advisories/mfsa2024-31/ -
  • () https://www.mozilla.org/security/advisories/mfsa2024-32/ -

09 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-09 15:15

Updated : 2025-04-04 14:42


NVD link : CVE-2024-6604

Mitre link : CVE-2024-6604

CVE.ORG link : CVE-2024-6604


JSON object : View

Products Affected

mozilla

  • thunderbird
  • firefox
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')