Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-4578

Опубликовано: 11 сент. 2023
Источник: debian

Описание

When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed117.0-1package
firefox-esrfixed115.2.0esr-1package
firefox-esrnot-affectedbookwormpackage
firefox-esrnot-affectedbullseyepackage
firefox-esrnot-affectedbusterpackage
thunderbirdfixed1:115.2.0-1package
thunderbirdnot-affectedbookwormpackage
thunderbirdnot-affectedbullseyepackage
thunderbirdnot-affectedbusterpackage

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-34/#CVE-2023-4578

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-36/#CVE-2023-4578

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-38/#CVE-2023-4578

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 2 года назад

When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVSS3: 6.1
redhat
почти 2 года назад

When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVSS3: 6.5
nvd
почти 2 года назад

When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVSS3: 6.5
github
почти 2 года назад

When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVSS3: 7.4
fstec
почти 2 года назад

Уязвимость обработчика JavaScript-сценариев SpiderMonkey браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании