CVE-2023-37201Use After Free in Mozilla Firefox

CWE-416Use After Free13 documents8 sources
Severity
8.8HIGHNVD
OSV6.5OSV3.1
EPSS
0.8%
top 26.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 5
Latest updateJul 11

Description

An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages9 packages

CVEListV5mozilla/firefoxunspecified115
NVDmozilla/firefox< 115.0
CVEListV5mozilla/firefox_esrunspecified102.13
NVDmozilla/firefox_esr< 102.13
Ubuntumozilla/firefox< 115.0+build2-0ubuntu0.20.04.3

Also affects: Debian Linux 10.0, 11.0, 12.0

🔴Vulnerability Details

5
OSV
thunderbird vulnerabilities2023-07-11
OSV
firefox vulnerabilities2023-07-05
CVEList
CVE-2023-37201: An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS2023-07-05
GHSA
GHSA-75qj-fcp3-j9w2: An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS2023-07-05
OSV
CVE-2023-37201: An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS2023-07-05

📋Vendor Advisories

7
Ubuntu
Thunderbird vulnerabilities2023-07-11
Ubuntu
Firefox vulnerabilities2023-07-05
Red Hat
Mozilla: Use-after-free in WebRTC certificate generation2023-07-04
Debian
CVE-2023-37201: firefox - An attacker could have triggered a use-after-free condition when creating a WebR...2023
Mozilla
Mozilla Foundation Security Advisory 2023-22: CVE-2023-37201
CVE-2023-37201 — Use After Free in Mozilla Firefox | cvebase