CVE-2025-0238Use After Free in Mozilla Firefox

CWE-416Use After Free14 documents8 sources
Severity
5.3MEDIUMNVD
OSV5.4
EPSS
0.1%
top 67.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 7
Latest updateJul 22

Description

Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Firefox ESR 115.19, Thunderbird 134, and Thunderbird 128.6.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

NVDmozilla/firefox116.0128.6.0+2
Ubuntumozilla/firefox< 134.0+build1-0ubuntu0.20.04.1
NVDmozilla/thunderbird129.0134.0+1
Debianmozilla/thunderbird< 1:128.6.0esr-1~deb11u1+3

🔴Vulnerability Details

4
OSV
firefox vulnerabilities2025-01-09
GHSA
GHSA-phcc-6pmp-qw9v: Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash2025-01-07
CVEList
Use-after-free when breaking lines in text2025-01-07
OSV
CVE-2025-0238: Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash2025-01-07

📋Vendor Advisories

9
Ubuntu
Thunderbird vulnerabilities2025-07-22
Ubuntu
Firefox vulnerabilities2025-01-09
Red Hat
firefox: thunderbird: Use-after-free when breaking lines in text2025-01-07
Debian
CVE-2025-0238: firefox - Assuming a controlled failed memory allocation, an attacker could have caused a ...2025
Mozilla
Mozilla Foundation Security Advisory 2025-04: CVE-2025-0238
CVE-2025-0238 — Use After Free in Mozilla Firefox | cvebase