CVE-2024-5688Use After Free in Mozilla Firefox

CWE-416Use After Free13 documents8 sources
Severity
8.1HIGHNVD
EPSS
1.2%
top 21.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateJul 3

Description

If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages7 packages

CVEListV5mozilla/firefoxunspecified127
NVDmozilla/firefox< 115.12+1
CVEListV5mozilla/firefox_esrunspecified115.12
CVEListV5mozilla/thunderbirdunspecified115.12
NVDmozilla/thunderbird< 115.12

🔴Vulnerability Details

5
OSV
firefox vulnerabilities2024-07-03
OSV
thunderbird vulnerabilities2024-06-19
GHSA
GHSA-g23m-h4v3-g2qq: If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant2024-06-11
CVEList
CVE-2024-5688: If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant2024-06-11
OSV
CVE-2024-5688: If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant2024-06-11

📋Vendor Advisories

7
Ubuntu
Firefox vulnerabilities2024-07-03
Ubuntu
Thunderbird vulnerabilities2024-06-19
Red Hat
Mozilla: Use-after-free in JavaScript object transplant2024-06-11
Debian
CVE-2024-5688: firefox - If a garbage collection was triggered at the right time, a use-after-free could ...2024
Mozilla
Mozilla Foundation Security Advisory 2024-26: CVE-2024-5688
CVE-2024-5688 — Use After Free in Mozilla Firefox | cvebase