First published: Tue Aug 01 2023(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <115.1 | 115.1 |
Mozilla Thunderbird | <115.1 | 115.1 |
redhat/firefox | <115.1 | 115.1 |
redhat/thunderbird | <115.1 | 115.1 |
Mozilla Firefox | <116 | 116 |
Mozilla Firefox | <116.0 | |
Mozilla Firefox ESR | <115.1 | |
debian/firefox | 132.0.2-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.3.1esr-2 128.4.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.4.3esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.4.0esr-1~deb12u1 1:128.4.2esr-1 1:128.4.3esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-4057 is critical with a score of 9.8.
Versions Firefox < 116, Firefox ESR < 115.1, Thunderbird < 115.1 are affected by CVE-2023-4057.
There is evidence that with enough effort, the memory corruption bugs in CVE-2023-4057 could be exploited to run arbitrary code.
To fix CVE-2023-4057, update Firefox to version 116 or later, Firefox ESR to version 115.1 or later, and Thunderbird to version 115.1 or later.
You can find more information about CVE-2023-4057 in the following references: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1841682), [Mozilla Advisory](https://www.mozilla.org/security/advisories/mfsa2023-29/), [Mozilla Advisory](https://www.mozilla.org/security/advisories/mfsa2023-31/).