First published: Tue Apr 16 2024(Updated: )
A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 135.0-1 | |
Firefox | <125 | 125 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-3856 has been classified as a critical vulnerability that could lead to arbitrary code execution.
To fix CVE-2024-3856, users should upgrade to Mozilla Firefox version 125 or later.
CVE-2024-3856 affects all versions of Firefox prior to 125.
Yes, CVE-2024-3856 can be exploited remotely through malicious websites leveraging WASM execution.
If upgrading is not possible for CVE-2024-3856, it's advisable to minimize exposure by avoiding untrusted websites and using alternative browsers.