CVE-2022-28282 — Use After Free in Mozilla Firefox
Severity
6.5MEDIUMNVD
EPSS
5.3%
top 9.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 22
Description
By using a link with rel="localization" a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages9 packages
🔴Vulnerability Details
5CVEList▶
CVE-2022-28282: By using a link with rel="localization" a use-after-free could have been triggered by destroying an object during JavaScript execution and then refere↗2022-12-22
GHSA▶
GHSA-mp96-4frc-r2pg: By using a link with rel="localization" a use-after-free could have been triggered by destroying an object during JavaScript execution and then refere↗2022-12-22
OSV▶
CVE-2022-28282: By using a link with rel="localization" a use-after-free could have been triggered by destroying an object during JavaScript execution and then refere↗2022-12-22
📋Vendor Advisories
7Debian▶
CVE-2022-28282: firefox - By using a link with <code>rel="localization"</code> a use-after-free could have...↗2022