Kaspersky ID:
KLA48839
Date de la détection:
04/11/2023
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in Fullscreen notification can be exploited to spoof user interface.
  2. Memory corruption vulnerability in Garbage Collection can be exploited remotely to cause denial of service or execute arbitrary code.
  3. Data race vulnerability in font initialization can be exploited to obtain sensitive information or execute arbitrary code.
  4. Security vulnerability can be exploited to bypass security restrictions.
  5. Information disclosure vulnerability in Private Browsing on Andoroid can be exploited to obtain sensitive information.
  6. Out of bounds vulnerability in WebGL on macOS can be exploited to cause denial of service.
  7. Remote code execution vulnerability in Maintenance Service can be exploited remotely to execute arbitrary code.
  8. Memory corruption vulnerability in Garbage Collection compaction can be exploited remotely to cause denial of service or execute arbitrary code.
  9. Invalid free pointer in the memory manager can be remotely exploited to cause a denial of service or the execution of arbitrary code.
  10. Information disclosure vulnerability in Save As dialog on Windows can be exploited to obtain sensitive information.
  11. Security vulnerability in the ARM64 Ion compiler can be exploited to bypass security restrictions.
  12. Security vulnerability in the bind function can be exploited to bypass security restrictions.
  13. Security UI vulnerability in Fullscreen notification on Android can be exploited to spoof user interface.
  14. Use after free vulnerability in debugging APIs can be exploited to cause denial of service or execute arbitrary code.
  15. Remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  16. Information disclosure vulnerability in WebExtension can be exploited to obtain sensitive information.
  17. Memory safety vulnerability can be exploited to execute arbitrary code.
  18. Double-free memory address vulnerability in libwebp can be exploited remotely to cause denial of service or execute arbitrary code.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Produits associés

Liste CVE

  • CVE-2023-29533
    warning
  • CVE-2023-29544
    high
  • CVE-2023-29537
    critical
  • CVE-2023-29547
    high
  • CVE-2023-29546
    high
  • CVE-2023-29531
    critical
  • CVE-2023-29532
    high
  • CVE-2023-29535
    high
  • CVE-2023-29536
    critical
  • CVE-2023-29545
    high
  • CVE-2023-29548
    high
  • CVE-2023-29541
    critical
  • CVE-2023-29549
    high
  • CVE-2023-29534
    critical
  • CVE-2023-29543
    critical
  • CVE-2023-29542
    critical
  • CVE-2023-29539
    critical
  • CVE-2023-29540
    high
  • CVE-2023-29538
    warning
  • CVE-2023-29551
    critical
  • CVE-2023-29550
    critical
  • CVE-2023-1999
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.