QID 378383

Date Published: 2023-04-12

QID 378383: Mozilla Firefox Multiple Vulnerabilities (MFSA2023-13)

Firefox is a free and open-source web browser developed for Windows, OS X, and Linux, with a mobile version for Android.

Mozilla Firefox is prone to
CVE-2023-29531: Out-of-bound memory access in WebGL on macOS
CVE-2023-29532: Mozilla Maintenance Service Write-lock bypass
CVE-2023-29533: Fullscreen notification obscured
CVE-2023-29534: Fullscreen notification could have been obscured on Firefox for Android
CVE-2023-29535: Potential Memory Corruption following Garbage Collector compaction
CVE-2023-29536: Invalid free from JavaScript code
CVE-2023-29537: Data Races in font initialization code
CVE-2023-29538: Directory information could have been leaked to WebExtensions
CVE-2023-29539: Content-Disposition filename truncation leads to Reflected File Download
CVE-2023-29540: Iframe sandbox bypass using redirects and sourceMappingUrls
CVE-2023-29541: Files with malicious extensions could have been downloaded unsafely on Linux
CVE-2023-29542: Bypass of file download extension restrictions
CVE-2023-29543: Use-after-free in debugging APIs
CVE-2023-29544: Memory Corruption in garbage collector
CVE-2023-29545: Windows Save As dialog resolved environment variables
CVE-2023-29546: Screen recording in Private Browsing included address bar on Android
CVE-2023-29547: Secure document cookie could be spoofed with insecure cookie
CVE-2023-29548: Incorrect optimization result on ARM64
CVE-2023-29549: Javascript's bind function may have failed
CVE-2023-29550: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
CVE-2023-29551: Memory safety bugs fixed in Firefox 112

Affected Products:
Prior to Firefox 112

QID Detection Logic (Authenticated) :
This checks for vulnerable version of Firefox browser.


Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Vendor has released fix to address these vulnerabilities. Refer to MFSA2023-13 or later
    Software Advisories
    Advisory ID Software Component Link
    MFSA2023-13 URL Logo www.mozilla.org/en-US/security/advisories/mfsa2023-13/