First published: Tue Aug 01 2023(Updated: )
In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape.
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <102.14 | 102.14 |
Mozilla Firefox ESR | <115.1 | 115.1 |
Mozilla Thunderbird | <102.14 | 102.14 |
Mozilla Thunderbird | <115.1 | 115.1 |
redhat/firefox | <102.14 | 102.14 |
redhat/firefox | <115.1 | 115.1 |
redhat/thunderbird | <102.14 | 102.14 |
redhat/thunderbird | <115.1 | 115.1 |
Mozilla Firefox | <116 | 116 |
Mozilla Firefox | <116.0 | |
Mozilla Firefox ESR | >=102.0<102.14 | |
Mozilla Firefox ESR | >=115.0<115.1 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Mozilla Firefox | >=102.0<102.14 | |
Mozilla Firefox | >=115.0<115.1 | |
debian/firefox | 132.0.2-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.3.1esr-2 128.4.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.4.3esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.4.0esr-1~deb12u1 1:128.4.2esr-1 1:128.4.3esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2023-4050 is high.
CVE-2023-4050 affects Mozilla Thunderbird, Firefox, and Firefox ESR.
To fix CVE-2023-4050, update Mozilla Thunderbird to version 115.1, Firefox to version 116, or Firefox ESR to version 102.14.
Yes, you can find more information about CVE-2023-4050 at the following links: [Link1](https://www.mozilla.org/security/advisories/mfsa2023-30/), [Link2](https://www.mozilla.org/security/advisories/mfsa2023-31/), [Link3](https://bugzilla.mozilla.org/show_bug.cgi?id=1843038).
The CWE for CVE-2023-4050 is CWE-787.