CVE-2024-7520
06.08.2024, 13:15
A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1.
| Vendor | Product | Version |
|---|---|---|
| mozilla | firefox | 𝑥 < 129.0 |
| mozilla | firefox_esr | 𝑥 < 128.1.0 |
| mozilla | thunderbird | 𝑥 < 128.1.0 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| firefox |
| ||||||||||||||
| thunderbird |
| ||||||||||||||
| mozjs38 |
| ||||||||||||||
| mozjs52 |
| ||||||||||||||
| mozjs68 |
| ||||||||||||||
| mozjs78 |
| ||||||||||||||
| mozjs91 |
| ||||||||||||||
| mozjs102 |
| ||||||||||||||
| mozjs115 |
|
Common Weakness Enumeration
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
- CWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.