CVE-2023-6858

8.8 HIGH

📋 TL;DR

CVE-2023-6858 is a heap buffer overflow vulnerability in Firefox's nsTextFragment component caused by insufficient out-of-memory handling. Attackers could exploit this to execute arbitrary code or cause denial of service. This affects Firefox, Firefox ESR, and Thunderbird users running vulnerable versions.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
Versions: Firefox < 121, Firefox ESR < 115.6, Thunderbird < 115.6
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special settings required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or malware installation.

🟠

Likely Case

Browser crash (denial of service) or limited code execution within browser sandbox.

🟢

If Mitigated

No impact if patched; sandboxing may limit exploit effectiveness.

🌐 Internet-Facing: HIGH - Web browsers process untrusted internet content by design.
🏢 Internal Only: MEDIUM - Internal web applications could still trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires triggering specific memory conditions; no public exploit available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 121, Firefox ESR 115.6, Thunderbird 115.6

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1826791

Restart Required: Yes

Instructions:

1. Open browser. 2. Go to Settings > Help > About Firefox/Thunderbird. 3. Allow automatic update or download from mozilla.org. 4. Restart browser.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents exploitation by disabling JavaScript execution.

about:config > javascript.enabled = false

🧯 If You Can't Patch

  • Restrict browser to trusted websites only.
  • Use application whitelisting to prevent unauthorized code execution.

🔍 How to Verify

Check if Vulnerable:

Check browser version in About dialog; if below patched versions, vulnerable.

Check Version:

firefox --version or thunderbird --version

Verify Fix Applied:

Confirm version is Firefox ≥121, Firefox ESR ≥115.6, or Thunderbird ≥115.6.

📡 Detection & Monitoring

Log Indicators:

  • Browser crash logs with nsTextFragment references
  • Unexpected memory access errors

Network Indicators:

  • Suspicious web content delivery to browsers

SIEM Query:

source="browser_crash_logs" AND "nsTextFragment"

🔗 References

📤 Share & Export