Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-9680

Опубликовано: 09 окт. 2024
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.

A remote code execution vulnerability was found in Firefox and Thunderbird. The Mozilla Foundation Security Advisories state: An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines.

Отчет

The Mozilla Foundation Security Advisory indicates that this vulnerability is being exploited in the wild.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7thunderbirdOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportfirefoxFixedRHSA-2024:803414.10.2024
Red Hat Enterprise Linux 8firefoxFixedRHSA-2024:797710.10.2024
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2024:802414.10.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2024:803014.10.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportfirefoxFixedRHSA-2024:817616.10.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportthunderbirdFixedRHSA-2024:802914.10.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportfirefoxFixedRHSA-2024:816716.10.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2317442firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)

EPSS

Процентиль: 92%
0.09444
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
8 месяцев назад

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.

CVSS3: 9.8
nvd
8 месяцев назад

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.

CVSS3: 9.8
debian
8 месяцев назад

An attacker was able to achieve code execution in the content process ...

suse-cvrf
8 месяцев назад

Security update for MozillaThunderbird

rocky
8 месяцев назад

Important: thunderbird security update

EPSS

Процентиль: 92%
0.09444
Низкий

9.8 Critical

CVSS3