CVE-2023-6859Use After Free in Mozilla Firefox

CWE-416Use After Free14 documents8 sources
Severity
8.8HIGHNVD
OSV4.3
EPSS
0.4%
top 36.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 19
Latest updateJan 11

Description

A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages9 packages

CVEListV5mozilla/firefoxunspecified121
NVDmozilla/firefox< 121.0
CVEListV5mozilla/firefox_esrunspecified115.6
CVEListV5mozilla/thunderbirdunspecified115.6
NVDmozilla/firefox_esr< 115.6

Also affects: Debian Linux 10.0, 11.0, 12.0

🔴Vulnerability Details

6
OSV
firefox regressions2024-01-11
OSV
thunderbird vulnerabilities2024-01-02
OSV
firefox vulnerabilities2024-01-02
OSV
CVE-2023-6859: A use-after-free condition affected TLS socket creation when under memory pressure2023-12-19
GHSA
GHSA-gx9r-x967-x29h: A use-after-free condition affected TLS socket creation when under memory pressure2023-12-19

📋Vendor Advisories

7
Ubuntu
Firefox vulnerabilities2024-01-02
Ubuntu
Thunderbird vulnerabilities2024-01-02
Red Hat
Mozilla: Use-after-free in PR_GetIdentitiesLayer2023-12-19
Debian
CVE-2023-6859: firefox - A use-after-free condition affected TLS socket creation when under memory pressu...2023
Mozilla
Mozilla Foundation Security Advisory 2023-54: CVE-2023-6859
CVE-2023-6859 — Use After Free in Mozilla Firefox | cvebase