First published: Tue Jan 26 2021(Updated: )
Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 | |
Thunderbird | <78.7 | 78.7 |
Firefox | <85.0 | |
Firefox ESR | <78.7 | |
Thunderbird | <78.7 | |
Firefox | <85 | 85 |
Firefox ESR | <78.7 | 78.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-23960 is classified as a high-severity vulnerability due to the potential for user-after-poison exploitation leading to a crash.
To resolve CVE-2021-23960, upgrade affected applications to versions newer than 78.7 for Thunderbird or 85 for Firefox.
CVE-2021-23960 affects Mozilla Thunderbird versions up to 78.7, Firefox versions up to 85, and Firefox ESR versions up to 78.7.
Users of vulnerable software may experience crashes and could be exposed to potential exploit scenarios due to unhandled JavaScript variables.
There have been reports suggesting that CVE-2021-23960 may be exploited in the wild, which emphasizes the importance of updating affected applications promptly.