Bug 1215800 (ZDI-23-1467) - VUL-0: ZDI-23-1467: MozillaFirefox: Mozilla Firefox JIT Boolean Conversion Crash due to missing check for uninitialized lexicals
Summary: VUL-0: ZDI-23-1467: MozillaFirefox: Mozilla Firefox JIT Boolean Conversion Cr...
Status: RESOLVED INVALID
Alias: ZDI-23-1467
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Mozilla Bugs
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/380214/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-28 09:39 UTC by SMASH SMASH
Modified: 2023-09-28 09:46 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-09-28 09:39:53 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected
installations of Mozilla Firefox. User interaction is required to exploit this
vulnerability in that the target must visit a malicious page or open a malicious
file.

The specific flaw exists within the implementation of boolean conversions in the
JIT engine. The issue results from the lack of proper initialization of memory
prior to accessing it. An attacker can leverage this vulnerability to execute
code in the context of the current process.
Comment 2 Cathy Hu 2023-09-28 09:46:02 UTC
From the firefox bugtracker this is not exploitable and also not a remote code execution vuln, so i will not ask ZDI to assign a CVE.

This was fixed in firefox one year ago in the 106 version, so we are not affected.

Closing