### [CVE-2024-2608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%20115.9%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%20124%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Integer%20overflow%20could%20have%20led%20to%20out%20of%20bounds%20write&color=brighgreen) ### Description `AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9. ### POC #### Reference - https://bugzilla.mozilla.org/show_bug.cgi?id=1880692 #### Github - https://github.com/NaInSec/CVE-LIST - https://github.com/fkie-cad/nvd-json-data-feeds