CVE-2023-5169
Advisory lineage Upstream: 0 Downstream: 31
Modified
Published: 27 Sept 2023, 14:13
Last modified:13 Feb 2025, 17:19
Vulnerability Summary
Overall Risk (default)
medium
26/100 CVSS Score
6.5 MEDIUM
v3.1 (nvd)
EPSS Score
0.24% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
27 Sept 2023, 14:13
Published
Vulnerability first disclosed
13 Feb 2025, 17:19
Last Modified
Vulnerability information updated
Description
A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
CVSS Metrics
- v3.1•MEDIUM•Score: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS Trends
Current EPSS score: 0.24%• Percentile: 47%
Techniques & Countermeasures
- CWE-787•Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
Affected Systems
- debian•debian_linux
10.0 | 11.0 | 12.0
- fedoraproject•fedora
39
- Unknown•Firefox
≥ unspecified, < 118 | < 118
- mozilla•firefox esr
≥ unspecified, < 115.3 | < 115.3
- mozilla•thunderbird
≥ unspecified, < 115.3 | < 115.3
References (9)
- https://bugzilla.mozilla.org/show_bug.cgi?id=1846685
- https://www.mozilla.org/security/advisories/mfsa2023-41/
- https://www.mozilla.org/security/advisories/mfsa2023-42/
- https://www.mozilla.org/security/advisories/mfsa2023-43/
- https://www.debian.org/security/2023/dsa-5506
- https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
- https://www.debian.org/security/2023/dsa-5513
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
- https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html