CVE-2023-29531

9.8 CRITICAL

📋 TL;DR

This vulnerability allows an attacker to trigger an out-of-bounds memory access via WebGL APIs in Firefox or Thunderbird on macOS, potentially leading to memory corruption and an exploitable crash. It affects users running Firefox versions below 112, Firefox ESR below 102.10, or Thunderbird below 102.10 on macOS only.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
Versions: Firefox < 112, Firefox ESR < 102.10, Thunderbird < 102.10
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS; other operating systems are not vulnerable. WebGL must be enabled, which is default in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Exploitation could lead to arbitrary code execution, allowing an attacker to take control of the affected system.

🟠

Likely Case

Most probable impact is a denial of service (crash) of the browser or email client, disrupting user activity.

🟢

If Mitigated

With proper patching, the risk is eliminated; without patching, isolating affected systems reduces exposure.

🌐 Internet-Facing: HIGH, as exploitation can occur via malicious web content accessed over the internet.
🏢 Internal Only: MEDIUM, as internal users might access compromised internal sites, but external attack vectors are more common.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (e.g., visiting a malicious website) but no authentication. No public proof-of-concept has been disclosed as per references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 112, Firefox ESR 102.10, Thunderbird 102.10

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2023-13/

Restart Required: Yes

Instructions:

1. Open the affected application (Firefox or Thunderbird). 2. Go to the menu (e.g., Firefox > About Firefox or Thunderbird > About Thunderbird). 3. Allow the application to check for and install updates automatically. 4. Restart the application as prompted.

🔧 Temporary Workarounds

Disable WebGL

all

Prevents exploitation by disabling the vulnerable WebGL APIs.

In Firefox/Thunderbird, type 'about:config' in the address bar, search for 'webgl.disabled', and set it to 'true'.

🧯 If You Can't Patch

  • Restrict access to untrusted websites by using network filtering or web proxies.
  • Isolate affected macOS systems from internet access or limit browser usage to trusted applications.

🔍 How to Verify

Check if Vulnerable:

Check the application version: in Firefox/Thunderbird, go to menu > About Firefox/Thunderbird. If version is below the patched version and OS is macOS, it is vulnerable.

Check Version:

On macOS, open Terminal and run: /Applications/Firefox.app/Contents/MacOS/firefox --version or /Applications/Thunderbird.app/Contents/MacOS/thunderbird --version

Verify Fix Applied:

After updating, verify the version is at least Firefox 112, Firefox ESR 102.10, or Thunderbird 102.10 via the About menu.

📡 Detection & Monitoring

Log Indicators:

  • Look for crash reports or error logs in Firefox/Thunderbird related to WebGL or memory access violations on macOS.

Network Indicators:

  • Monitor for unusual web traffic to known malicious domains that might host exploit code.

SIEM Query:

Example: source="firefox.log" OR source="thunderbird.log" AND (error="out of bounds" OR error="WebGL") AND os="macOS"

🔗 References

📤 Share & Export