First published: Tue Sep 03 2024(Updated: )
When aborting the verification of an OTR chat session, an attacker could have caused a use-after-free bug leading to a potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <128.2 | 128.2 |
Thunderbird | <128.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-8394 has the potential for high severity due to the existence of a use-after-free vulnerability that could lead to crashes.
To resolve CVE-2024-8394, users should update their Mozilla Thunderbird to version 128.3 or later.
CVE-2024-8394 affects Mozilla Thunderbird versions up to and including 128.2.
Yes, CVE-2024-8394 can potentially be exploited remotely during an OTR chat session verification process.
In the context of CVE-2024-8394, a use-after-free vulnerability occurs when memory is accessed after it has been freed, leading to crashes or potential code execution.