cve/2023/CVE-2023-25732.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-25732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20102.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20110%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Out%20of%20bounds%20memory%20write%20from%20EncodeInputStream&color=brighgreen)
### Description
When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
#### Github
No PoCs found on GitHub currently.