Mozilla Foundation Security Advisory 2024-64
Security Vulnerabilities fixed in Firefox ESR 128.5
- Announced
- November 26, 2024
- Impact
- high
- Products
- Firefox ESR
- Fixed in
-
- Firefox ESR 128.5
#CVE-2024-11691: Out-of-bounds write in Apple GPU drivers via WebGL
- Reporter
- Dohyun Lee (@l33d0hyun) of USELab, Korea University & Youngho Choi of CEL, Korea University & Geumhwan Cho of USELab, Korea University
- Impact
- high
Description
Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver.
This bug only affected the application on Apple M series hardware. Other platforms were unaffected.
References
#CVE-2024-11692: Select list elements could be shown over another site
- Reporter
- Shaheen Fazim
- Impact
- moderate
Description
An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks.
References
#CVE-2024-11693: Download Protections were bypassed by .library-ms files on Windows
- Reporter
- Marco Bonardo
- Impact
- moderate
Description
The executable file warning was not presented when downloading .library-ms files.
Note: This issue only affected Windows operating systems. Other operating systems are unaffected.
References
#CVE-2024-11694: CSP Bypass and XSS Exposure via Web Compatibility Shims
- Reporter
- Masato Kinugawa
- Impact
- moderate
Description
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP frame-src
bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content.
References
#CVE-2024-11695: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters
- Reporter
- Renwa Hiwa
- Impact
- moderate
Description
A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack.
References
#CVE-2024-11696: Unhandled Exception in Add-on Signature Verification
- Reporter
- Rob Wu
- Impact
- moderate
Description
The application failed to account for exceptions thrown by the loadManifestFromFile
method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue.
References
#CVE-2024-11697: Improper Keypress Handling in Executable File Confirmation Dialog
- Reporter
- Umar Farooq
- Impact
- low
Description
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution.
References
#CVE-2024-11698: Fullscreen Lock-Up When Modal Dialog Interrupts Transition on macOS
- Reporter
- Kang Ali of Punggawa Cybersecurity
- Impact
- low
Description
A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted.
This bug only affects the application when running on macOS. Other operating systems are unaffected.
References
#CVE-2024-11699: Memory safety bugs fixed in Firefox 133, Firefox ESR 128.5, and Thunderbird 128.5
- Reporter
- Akmat Suleimanov, Andrew McCreight
- Impact
- high
Description
Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.