First published: Tue Jan 17 2023(Updated: )
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <102.7 | 102.7 |
<109 | 109 | |
<102.7 | 102.7 | |
<102.7 | 102.7 | |
Mozilla Firefox | <109.0 | |
Mozilla Firefox ESR | <102.7 | |
Mozilla Thunderbird | <102.7 | |
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | <=91.12.0esr-1~deb10u1 | 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 |
debian/thunderbird | <=1:91.12.0-1~deb10u1 | 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-23605 is high with a severity value of 8.8.
CVE-2023-23605 affects Mozilla Firefox ESR versions up to and including 102.7, Mozilla Thunderbird versions up to and including 102.7, and Debian packages of Firefox and Thunderbird.
Yes, the recommended remedy for CVE-2023-23605 is to update to Mozilla Firefox ESR version 102.7 or higher, update to Mozilla Thunderbird version 102.7 or higher, or update the affected Debian packages of Firefox and Thunderbird to the recommended versions.
Yes, you can find more information about CVE-2023-23605 in the following references: [Link 1](https://www.mozilla.org/security/advisories/mfsa2023-01/), [Link 2](https://www.mozilla.org/security/advisories/mfsa2023-03/), [Link 3](https://www.mozilla.org/security/advisories/mfsa2023-02/).
The Common Weakness Enumeration (CWE) for CVE-2023-23605 is CWE-787.