CVE-2023-4578Allocation of Resources Without Limits or Throttling in Mozilla Firefox

Severity
6.5MEDIUMNVD
OSV8.8
EPSS
0.2%
top 64.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11
Latest updateOct 3

Description

When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages9 packages

CVEListV5mozilla/firefoxunspecified117
NVDmozilla/firefox< 117.0
CVEListV5mozilla/firefox_esrunspecified115.2
NVDmozilla/firefox_esr< 115.2
Ubuntumozilla/firefox< 117.0+build2-0ubuntu0.20.04.1

🔴Vulnerability Details

5
OSV
thunderbird vulnerabilities2023-10-03
CVEList
Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception2023-09-11
OSV
CVE-2023-4578: When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`2023-09-11
GHSA
GHSA-phv6-6pfh-prxc: When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`2023-09-11
OSV
firefox vulnerabilities2023-08-30

📋Vendor Advisories

7
Ubuntu
Thunderbird vulnerabilities2023-10-03
Ubuntu
Firefox vulnerabilities2023-08-30
Red Hat
Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception2023-08-29
Debian
CVE-2023-4578: firefox - When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which wo...2023
Mozilla
Mozilla Foundation Security Advisory 2023-36: CVE-2023-4578
CVE-2023-4578 — Mozilla Firefox vulnerability | cvebase