First published: Tue May 09 2023(Updated: )
Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service. *Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <102.11 | 102.11 |
<113 | 113 | |
<102.11 | 102.11 | |
<102.11 | 102.11 | |
All of | ||
Any of | ||
Mozilla Firefox | <113.0 | |
Mozilla Firefox ESR | <102.11 | |
Mozilla Thunderbird | <102.11 | |
Microsoft Windows | ||
Mozilla Firefox | <113.0 | |
Mozilla Firefox ESR | <102.11 | |
Mozilla Thunderbird | <102.11 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2023-32214.
This vulnerability can be exploited by leveraging the protocol handlers ms-cxh and ms-cxh-full to trigger a denial of service.
This vulnerability only affects Windows. Other operating systems are not affected.
The severity of this vulnerability is low.
To fix this vulnerability, update Mozilla Thunderbird to version 102.11, Mozilla Firefox to version 113, or Mozilla Firefox ESR to version 102.11.