First published: Tue May 09 2023(Updated: )
Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service. *Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <102.11 | 102.11 |
Firefox | <113 | 113 |
Firefox ESR | <102.11 | 102.11 |
All of | ||
Any of | ||
Firefox | <113.0 | |
Firefox ESR | <102.11 | |
Thunderbird | <102.11 | |
Microsoft Windows Operating System | ||
Firefox | <113.0 | |
Firefox ESR | <102.11 | |
Thunderbird | <102.11 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2023-32214.
This vulnerability can be exploited by leveraging the protocol handlers ms-cxh and ms-cxh-full to trigger a denial of service.
This vulnerability only affects Windows. Other operating systems are not affected.
The severity of this vulnerability is low.
To fix this vulnerability, update Mozilla Thunderbird to version 102.11, Mozilla Firefox to version 113, or Mozilla Firefox ESR to version 102.11.