CVE-2023-4050Out-of-bounds Write in Mozilla Firefox

Severity
7.5HIGHNVD
EPSS
4.6%
top 10.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateSep 4

Description

In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5mozilla/firefoxunspecified116
NVDmozilla/firefox102.0102.14+2
CVEListV5mozilla/firefox_esrunspecified102.14+1
Debianmozilla/thunderbird< 1:102.14.0-1~deb11u1+3

Also affects: Debian Linux 11.0, 12.0

🔴Vulnerability Details

3
CVEList
CVE-2023-4050: In some cases, an untrusted input stream was copied to a stack buffer without checking its size2023-08-01
GHSA
GHSA-rj59-6cjh-fxcf: In some cases, an untrusted input stream was copied to a stack buffer without checking its size2023-08-01
OSV
CVE-2023-4050: In some cases, an untrusted input stream was copied to a stack buffer without checking its size2023-08-01

📋Vendor Advisories

9
Ubuntu
Thunderbird vulnerabilities2023-09-04
Ubuntu
Firefox vulnerabilities2023-08-02
Red Hat
Mozilla: Stack buffer overflow in StorageManager2023-08-01
Debian
CVE-2023-4050: firefox - In some cases, an untrusted input stream was copied to a stack buffer without ch...2023
Mozilla
Mozilla Foundation Security Advisory 2023-31: CVE-2023-4050
CVE-2023-4050 — Out-of-bounds Write in Mozilla Firefox | cvebase