First published: Tue Feb 04 2025(Updated: )
An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <115.20 | 115.20 |
Mozilla Thunderbird | <135 | 135 |
Mozilla Firefox | <135 | 135 |
<128.7 | 128.7 | |
<128.7 | 128.7 | |
Mozilla Firefox | <115.20.0 | |
Mozilla Firefox | <135.0 | |
Mozilla Firefox | >=128.1.0<128.7.0 | |
Mozilla Thunderbird | >=128.0.1<128.7.0 | |
Mozilla Thunderbird | >=131.0<135.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-1009 is considered a potentially exploitable vulnerability due to a use-after-free condition in Firefox and Thunderbird.
To fix CVE-2025-1009, update Firefox to version 135 or Thunderbird to version 128.7 or higher.
CVE-2025-1009 affects Firefox versions below 135.
CVE-2025-1009 affects Thunderbird versions below 128.7.
CVE-2025-1009 can facilitate crashes that may be exploited by attackers through crafted XSLT data.