CVE-2023-5728

7.5 HIGH

📋 TL;DR

A use-after-free vulnerability in Firefox, Firefox ESR, and Thunderbird garbage collection could allow attackers to cause a crash or potentially execute arbitrary code. This affects users running vulnerable versions of these Mozilla applications. The vulnerability occurs when garbage collection performs operations on objects that should no longer be accessible.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
Versions: Firefox < 119, Firefox ESR < 115.4, Thunderbird < 115.4.1
Operating Systems: All platforms where affected versions run
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or malware installation.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption leading to unstable behavior.

🟢

If Mitigated

No impact if patched versions are deployed or vulnerable applications are not used.

🌐 Internet-Facing: HIGH - Web browsers process untrusted content from the internet, making them prime targets.
🏢 Internal Only: MEDIUM - Internal users could be targeted via malicious internal websites or documents.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires triggering specific garbage collection conditions. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 119+, Firefox ESR 115.4+, Thunderbird 115.4.1+

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1852729

Restart Required: Yes

Instructions:

1. Open affected application. 2. Go to Help > About Firefox/Thunderbird. 3. Allow automatic update to complete. 4. Restart application when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents execution of malicious JavaScript that could trigger the vulnerability.

about:config -> javascript.enabled = false

Use alternative browser

all

Temporarily switch to a non-vulnerable browser until patches are applied.

🧯 If You Can't Patch

  • Restrict access to untrusted websites and email content
  • Implement application whitelisting to prevent execution of vulnerable versions

🔍 How to Verify

Check if Vulnerable:

Check application version in Help > About Firefox/Thunderbird and compare to affected versions.

Check Version:

firefox --version | thunderbird --version

Verify Fix Applied:

Confirm version is Firefox 119+, Firefox ESR 115.4+, or Thunderbird 115.4.1+.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs with memory access violations
  • Unexpected termination of Firefox/Thunderbird processes

Network Indicators:

  • Unusual outbound connections following browser crashes

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="firefox.exe" OR ProcessName="thunderbird.exe"

🔗 References

📤 Share & Export