Kaspersky ID:
KLA48839
Detect Date:
04/11/2023
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in Fullscreen notification can be exploited to spoof user interface.
  2. Memory corruption vulnerability in Garbage Collection can be exploited remotely to cause denial of service or execute arbitrary code.
  3. Data race vulnerability in font initialization can be exploited to obtain sensitive information or execute arbitrary code.
  4. Security vulnerability can be exploited to bypass security restrictions.
  5. Information disclosure vulnerability in Private Browsing on Andoroid can be exploited to obtain sensitive information.
  6. Out of bounds vulnerability in WebGL on macOS can be exploited to cause denial of service.
  7. Remote code execution vulnerability in Maintenance Service can be exploited remotely to execute arbitrary code.
  8. Memory corruption vulnerability in Garbage Collection compaction can be exploited remotely to cause denial of service or execute arbitrary code.
  9. Invalid free pointer in the memory manager can be remotely exploited to cause a denial of service or the execution of arbitrary code.
  10. Information disclosure vulnerability in Save As dialog on Windows can be exploited to obtain sensitive information.
  11. Security vulnerability in the ARM64 Ion compiler can be exploited to bypass security restrictions.
  12. Security vulnerability in the bind function can be exploited to bypass security restrictions.
  13. Security UI vulnerability in Fullscreen notification on Android can be exploited to spoof user interface.
  14. Use after free vulnerability in debugging APIs can be exploited to cause denial of service or execute arbitrary code.
  15. Remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  16. Information disclosure vulnerability in WebExtension can be exploited to obtain sensitive information.
  17. Memory safety vulnerability can be exploited to execute arbitrary code.
  18. Double-free memory address vulnerability in libwebp can be exploited remotely to cause denial of service or execute arbitrary code.

Original advisories

Related products

CVE list

  • CVE-2023-29533
    warning
  • CVE-2023-29544
    high
  • CVE-2023-29537
    critical
  • CVE-2023-29547
    high
  • CVE-2023-29546
    high
  • CVE-2023-29531
    critical
  • CVE-2023-29532
    high
  • CVE-2023-29535
    high
  • CVE-2023-29536
    critical
  • CVE-2023-29545
    high
  • CVE-2023-29548
    high
  • CVE-2023-29541
    critical
  • CVE-2023-29549
    high
  • CVE-2023-29534
    critical
  • CVE-2023-29543
    critical
  • CVE-2023-29542
    critical
  • CVE-2023-29539
    critical
  • CVE-2023-29540
    high
  • CVE-2023-29538
    warning
  • CVE-2023-29551
    critical
  • CVE-2023-29550
    critical
  • CVE-2023-1999
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.