First published: Tue Mar 14 2023(Updated: )
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue that when accessing throttled streams, the count of available bytes needs to be checked in the calling function to be within bounds. This may have led future code to be incorrect and vulnerable.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <0:102.9.0-3.el7_9 | 0:102.9.0-3.el7_9 |
redhat/thunderbird | <0:102.9.0-1.el7_9 | 0:102.9.0-1.el7_9 |
redhat/firefox | <0:102.9.0-3.el8_7 | 0:102.9.0-3.el8_7 |
redhat/thunderbird | <0:102.9.0-1.el8_7 | 0:102.9.0-1.el8_7 |
redhat/thunderbird | <0:102.9.0-2.el8_1 | 0:102.9.0-2.el8_1 |
redhat/firefox | <0:102.9.0-4.el8_1 | 0:102.9.0-4.el8_1 |
redhat/thunderbird | <0:102.9.0-2.el8_2 | 0:102.9.0-2.el8_2 |
redhat/firefox | <0:102.9.0-4.el8_2 | 0:102.9.0-4.el8_2 |
redhat/firefox | <0:102.9.0-4.el8_4 | 0:102.9.0-4.el8_4 |
redhat/thunderbird | <0:102.9.0-2.el8_4 | 0:102.9.0-2.el8_4 |
redhat/firefox | <0:102.9.0-3.el8_6 | 0:102.9.0-3.el8_6 |
redhat/thunderbird | <0:102.9.0-1.el8_6 | 0:102.9.0-1.el8_6 |
redhat/firefox | <0:102.9.0-3.el9_1 | 0:102.9.0-3.el9_1 |
redhat/thunderbird | <0:102.9.0-1.el9_1 | 0:102.9.0-1.el9_1 |
redhat/firefox | <0:102.9.0-3.el9_0 | 0:102.9.0-3.el9_0 |
redhat/thunderbird | <0:102.9.0-1.el9_0 | 0:102.9.0-1.el9_0 |
Mozilla Thunderbird | <102.9 | 102.9 |
Mozilla Firefox ESR | <102.9 | 102.9 |
redhat/firefox | <102.9 | 102.9 |
redhat/thunderbird | <102.9 | 102.9 |
Mozilla Firefox | <111 | 111 |
Mozilla Firefox | <111.0 | |
Mozilla Firefox ESR | <102.9 | |
Mozilla Thunderbird | <102.9 | |
debian/firefox | 131.0-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.3.0esr-1~deb11u2 115.14.0esr-1~deb12u1 128.3.0esr-1~deb12u1 115.15.0esr-1 128.3.0esr-2 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.15.0-1~deb11u1 1:115.12.0-1~deb12u1 1:115.15.0-1~deb12u1 1:128.2.0esr-1 1:128.3.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-25752 is a vulnerability in Mozilla that occurs when accessing throttled streams and can lead to incorrect and vulnerable code.
Mozilla Thunderbird versions up to 102.9, Mozilla Firefox versions up to 111, and certain versions of Red Hat Firefox and Thunderbird packages are affected.
CVE-2023-25752 has a severity rating of 6.1.
To fix CVE-2023-25752, update to the latest version of Mozilla Thunderbird or Mozilla Firefox, and ensure you have the latest security patches for Red Hat Firefox and Thunderbird packages.
You can find more information about CVE-2023-25752 in the Mozilla Foundation Security Advisory and Bugzilla.