First published: Tue Jan 23 2024(Updated: )
An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <115.9 | 115.9 |
redhat/thunderbird | <115.9 | 115.9 |
Thunderbird | <115.9 | 115.9 |
Firefox | <122 | 122 |
Firefox | <122.0 | |
Firefox ESR | <115.9 | 115.9 |
debian/firefox | 135.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.7.0esr-1~deb11u1 128.5.0esr-1~deb12u1 128.7.0esr-1~deb12u1 128.7.0esr-1 | |
debian/nss | <=2:3.61-1+deb11u3 | 2:3.61-1+deb11u4 2:3.87.1-1+deb12u1 2:3.108-1 |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.7.0esr-1~deb11u1 1:128.5.0esr-1~deb12u1 1:128.7.0esr-1~deb12u1 1:128.7.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-0743 has been identified as a potentially exploitable crash vulnerability in TLS handshake code.
CVE-2024-0743 affects Firefox versions less than 122, Firefox ESR versions less than 115.9, and Thunderbird versions less than 115.9.
To fix CVE-2024-0743, update to Firefox version 122, Firefox ESR version 115.9, or Thunderbird version 115.9 or later.
No, CVE-2024-0743 is not present in the latest version of Firefox 122 or any later versions.
While CVE-2024-0743 could lead to an exploitable crash, its precise exploitability may depend on specific conditions and usage.