First published: Tue Aug 29 2023(Updated: )
On Windows, an integer overflow could occur in `RecordedSourceSurfaceCreation` which resulted in a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape. *This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <102.15 | 102.15 |
Mozilla Firefox ESR | <115.2 | 115.2 |
Mozilla Thunderbird | <115.2 | 115.2 |
Mozilla Firefox ESR | <102.15 | 102.15 |
Mozilla Firefox | <117 | 117 |
Mozilla Firefox | <117.0 | |
Mozilla Firefox ESR | <102.15 | |
Mozilla Firefox ESR | >=115.0<115.2 | |
Mozilla Thunderbird | <115.2 | |
Microsoft Windows | ||
All of | ||
Any of | ||
Mozilla Firefox | <117.0 | |
Mozilla Firefox | >=115.0<115.2 | |
Mozilla Firefox ESR | <102.15 | |
Mozilla Thunderbird | <115.2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-4576 is a vulnerability in Mozilla Firefox and Thunderbird on Windows that allows an integer overflow, resulting in a heap buffer overflow and potential data leakage that could lead to a sandbox escape.
This vulnerability only affects Firefox and Thunderbird on Windows. Other operating systems are unaffected.
CVE-2023-4576 has a severity score of 8.6 (high).
To fix CVE-2023-4576, users should update Mozilla Firefox or Thunderbird to the recommended versions provided by Mozilla.
You can find more information about CVE-2023-4576 on the Mozilla website and the bugzilla.mozilla.org website.