QID 379315

Date Published: 2024-01-25

QID 379315: Mozilla Firefox Multiple Vulnerabilities (MFSA2024-01)

Firefox is a free and open-source web browser developed for Windows, OS X, and Linux, with a mobile version for Android.

Mozilla Firefox is prone to
CVE-2024-0741: Out of bounds write in ANGLE
CVE-2024-0742: Failure to update user input timestamp
CVE-2024-0743: Crash in NSS TLS method
CVE-2024-0744: Wild pointer dereference in JavaScript
CVE-2024-0745: Stack buffer overflow in WebAudio
CVE-2024-0746: Crash when listing printers on Linux
CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set
CVE-2024-0748: Compromised content process could modify document URI
CVE-2024-0749: Phishing site popup could show local origin in address bar
CVE-2024-0750: Potential permissions request bypass via clickjacking
CVE-2024-0751: Privilege escalation through devtools
CVE-2024-0752: Use-after-free could occur when applying update on macOS
CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain
CVE-2024-0754: Crash when using some WASM files in devtools
CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7

Affected Products:
Prior to Firefox 122

QID Detection Logic (Authenticated) :
This checks for vulnerable version of Firefox browser.


Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Vendor has released fix to address these vulnerabilities. Upgrade to Firefox 122 to fix vulnerability, you can also refer MFSA2024-01 or later for more details.
    Software Advisories
    Advisory ID Software Component Link
    MFSA2024-01 URL Logo www.mozilla.org/en-US/security/advisories/mfsa2024-01/