UBUNTU-CVE-2023-5173
Advisory lineage Upstream: 1 Downstream: 1
Upstream
Downstream
Published: 28 Sept 2023, 00:00
Last modified:04 Feb 2026, 03:47
Vulnerability Summary
Overall Risk (default)
medium
30/100 CVSS Score
7.5 HIGH
3.1 (osv_ubuntu)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
28 Sept 2023, 00:00
Published
Vulnerability first disclosed
04 Feb 2026, 03:47
Last Modified
Vulnerability information updated
Description
In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. *This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (`network.http.altsvc.oe`) is enabled.* This vulnerability affects Firefox < 118.
CVSS Metrics
- v3.1•HIGH•Score: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Systems
- ubuntu•firefox
< 118.0.1+build1-0ubuntu0.20.04.1
- ubuntu•mozjs102
all | all
- ubuntu•mozjs38
all
- ubuntu•mozjs52
all | all
- ubuntu•mozjs68
all
- ubuntu•mozjs78
all
- ubuntu•mozjs91
all
References (6)
- https://ubuntu.com/security/CVE-2023-5173
- https://www.mozilla.org/en-US/security/advisories/mfsa2023-41/#CVE-2023-5173
- https://www.mozilla.org/security/advisories/mfsa2023-41/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1823172
- https://ubuntu.com/security/notices/USN-6404-1
- https://www.cve.org/CVERecord?id=CVE-2023-5173