Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-3861

Опубликовано: 16 апр. 2024
Источник: debian
EPSS Низкий

Описание

If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed125.0.1-1package
firefox-esrfixed115.10.0esr-1package
thunderbirdfixed1:115.10.1-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-18/#CVE-2024-3861

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-19/#CVE-2024-3861

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-20/#CVE-2024-3861

EPSS

Процентиль: 28%
0.00098
Низкий

Связанные уязвимости

CVSS3: 4
ubuntu
больше 1 года назад

If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

CVSS3: 6.1
redhat
больше 1 года назад

If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

CVSS3: 4
nvd
больше 1 года назад

If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

CVSS3: 4
github
больше 1 года назад

If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125 and Firefox ESR < 115.10.

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 28%
0.00098
Низкий