First published: Tue Nov 26 2024(Updated: )
Last updated 3 December 2024
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 135.0-1 | |
debian/firefox-esr | <=115.14.0esr-1~deb11u1 | 128.7.0esr-1~deb11u1 128.5.0esr-1~deb12u1 128.7.0esr-1~deb12u1 128.7.0esr-1 |
debian/thunderbird | <=1:115.12.0-1~deb11u1 | 1:128.7.0esr-1~deb11u1 1:128.5.0esr-1~deb12u1 1:128.7.0esr-1~deb12u1 1:128.6.0esr-1 |
Thunderbird | <133 | 133 |
Thunderbird | <128.5 | 128.5 |
Firefox | <133 | 133 |
Firefox ESR | <128.5 | 128.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-11699 is a memory safety bug that could potentially allow attackers to run arbitrary code.
To fix CVE-2024-11699, upgrade to Mozilla Thunderbird version 133 or 128.5, or Mozilla Firefox version 133 or Firefox ESR version 128.5.
CVE-2024-11699 affects Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4.
There is evidence that the memory safety bugs in CVE-2024-11699 could potentially be exploited with significant effort.
Safe versions include Mozilla Thunderbird 133 and 128.5, Mozilla Firefox 133, and Firefox ESR 128.5.