Download Firefox

Firefox is no longer supported on Windows 8.1 and below.

Please download Firefox ESR (Extended Support Release) to use Firefox.

Firefox is no longer supported on macOS 10.14 and below.

Please download Firefox ESR (Extended Support Release) to use Firefox.

Firefox Privacy Notice

Mozilla Foundation Security Advisory 2023-16

Security Vulnerabilities fixed in Firefox 113

Announced
May 9, 2023
Impact
high
Products
Firefox
Fixed in
  • Firefox 113

#CVE-2023-32205: Browser prompts could have been obscured by popups

Reporter
Alesandro Ortiz
Impact
high
Description

In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks.

References

#CVE-2023-32206: Crash in RLBox Expat driver

Reporter
Irvan Kurniawan
Impact
high
Description

An out-of-bound read could have led to a crash in the RLBox Expat driver.

References

#CVE-2023-32207: Potential permissions request bypass via clickjacking

Reporter
Hafiizh
Impact
high
Description

A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions.

References

#CVE-2023-32208: Leak of script base URL in service workers via import()

Reporter
Anne van Kesteren
Impact
moderate
Description

Service workers could reveal script base URL due to dynamic import().

References

#CVE-2023-32209: Persistent DoS via favicon image

Reporter
Sam Ezeh
Impact
moderate
Description

A maliciously crafted favicon could have led to an out of memory crash.

References

#CVE-2023-32210: Incorrect principal object ordering

Reporter
Nika Layzell
Impact
moderate
Description

Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal. In certain circumstances it might have been possible to cause a document to be loaded with a higher privileged principal than intended.

References

#CVE-2023-32211: Content process crash due to invalid wasm code

Reporter
P1umer and xmzyshypnc
Impact
moderate
Description

A type checking bug would have led to invalid code being compiled.

References

#CVE-2023-32212: Potential spoof due to obscured address bar

Reporter
Hafiizh
Impact
moderate
Description

An attacker could have positioned a datalist element to obscure the address bar.

References

#CVE-2023-32213: Potential memory corruption in FileReader::DoReadData()

Reporter
Ronald Crane
Impact
moderate
Description

When reading a file, an uninitialized value could have been used as read limit.

References

#MFSA-TMP-2023-0002: Race condition in dav1d decoding

Reporter
Tyson Smith
Impact
moderate
Description

A race condition during dav1d decoding could have led to an out-of-bounds memory access, potentially leading to memory corruption and execution of malicious code.

References

#CVE-2023-32214: Potential DoS via exposed protocol handlers

Reporter
Edward Prior
Impact
low
Description

Protocol handlers ms-cxh and ms-cxh-full could have been leveraged to trigger a denial of service.
Note: This attack only affects Windows. Other operating systems are not affected.

References

#CVE-2023-32215: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11

Reporter
Mozilla developers and community
Impact
high
Description

Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2023-32216: Memory safety bugs fixed in Firefox 113

Reporter
Mozilla developers and community
Impact
high
Description

Mozilla developers and community members Ronald Crane, Andrew McCreight, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References