First published: Tue Sep 26 2023(Updated: )
If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. *This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <115.3 | 115.3 |
Mozilla Firefox ESR | <115.3 | 115.3 |
Mozilla Firefox | <118 | 118 |
Mozilla Firefox | <118 | |
Mozilla Firefox ESR | <115.3 | |
Mozilla Thunderbird | <115.3 | |
Microsoft Windows | ||
All of | ||
Any of | ||
Mozilla Firefox | <118 | |
Mozilla Firefox ESR | <115.3 | |
Mozilla Thunderbird | <115.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-5174.
The severity of CVE-2023-5174 is medium.
Mozilla Firefox ESR 115.3, Mozilla Firefox up to version 118, and Mozilla Thunderbird 115.3 are affected by CVE-2023-5174.
CVE-2023-5174 can be exploited through a use-after-free vulnerability caused by a failure to duplicate a handle during process creation.
Yes, a fix for CVE-2023-5174 is available. It is recommended to update to Mozilla Firefox ESR 115.3, Mozilla Firefox version 118, or Mozilla Thunderbird 115.3.