First published: Tue Sep 07 2021(Updated: )
Mozilla developers Gabriele Svelto and Tyson Smith reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <78.14 | 78.14 |
<92 | 92 | |
<78.14 | 78.14 | |
<78.14 | 78.14 | |
Mozilla Firefox | <92.0 | |
Mozilla Firefox ESR | <78.14 | |
Mozilla Thunderbird | <78.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-38493 has a medium severity rating due to the potential for memory corruption leading to arbitrary code execution.
To fix CVE-2021-38493, update Firefox to version 92 or higher, or update Firefox ESR and Thunderbird to version 78.14.
CVE-2021-38493 affects Firefox versions up to 91, Firefox ESR versions up to 78.13, and Thunderbird versions up to 78.13.
Yes, with sufficient effort, the memory safety bugs related to CVE-2021-38493 could potentially be exploited to execute arbitrary code.
CVE-2021-38493 was reported by Mozilla developers Gabriele Svelto and Tyson Smith.