When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1839007 | Issue Tracking Permissions Required |
https://www.mozilla.org/security/advisories/mfsa2023-34/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2023-36/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2023-38/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1839007 | Issue Tracking Permissions Required |
https://www.mozilla.org/security/advisories/mfsa2023-34/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2023-36/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2023-38/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-11 09:15
Updated : 2024-11-21 08:35
NVD link : CVE-2023-4578
Mitre link : CVE-2023-4578
CVE.ORG link : CVE-2023-4578
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- firefox_esr
CWE
CWE-770
Allocation of Resources Without Limits or Throttling