First published: Tue Oct 01 2024(Updated: )
A potential memory corruption vulnerability could be triggered if an attacker had the ability to trigger an OOM at a specific moment during JIT compilation.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 131.0.2-2 | |
debian/thunderbird | <=1:115.12.0-1~deb11u1<=1:115.15.0-1~deb11u1<=1:115.12.0-1~deb12u1<=1:115.15.0-1~deb12u1<=1:128.2.0esr-1 | 1:128.3.0esr-1 |
Thunderbird | <128.3 | 128.3 |
Thunderbird | <131 | 131 |
Firefox | <131 | 131 |
Firefox ESR | <128.3 | 128.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2024-9400 is classified as a memory corruption vulnerability that can be potentially exploited.
To fix CVE-2024-9400, users should update to the latest versions of Mozilla Thunderbird, Firefox, or Firefox ESR, specifically versions 131 or above for Thunderbird and Firefox, and 128.3 or above for Firefox ESR.
CVE-2024-9400 affects Mozilla Thunderbird up to version 131, Firefox up to version 131, and Firefox ESR up to version 128.3.
Yes, CVE-2024-9400 could potentially be exploited if an attacker triggers an out-of-memory (OOM) condition during the JIT compilation process.
The potential impact of CVE-2024-9400 includes memory corruption, which could allow an attacker to execute arbitrary code in the context of the affected application.