CVE-2023-5174

critical

Description

If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. *This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

References

https://www.mozilla.org/security/advisories/mfsa2023-43/

https://www.mozilla.org/security/advisories/mfsa2023-42/

https://www.mozilla.org/security/advisories/mfsa2023-41/

https://bugzilla.mozilla.org/show_bug.cgi?id=1848454

Details

Source: Mitre, NVD

Published: 2023-09-27

Updated: 2023-09-29

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical