CVE-2023-6861

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code via a heap buffer overflow in Firefox's nsWindow::PickerOpen method when running in headless mode. It affects Firefox ESR versions below 115.6, Thunderbird below 115.6, and Firefox below 121. Attackers could exploit this by tricking users into visiting malicious websites.

💻 Affected Systems

Products:
  • Firefox ESR
  • Thunderbird
  • Firefox
Versions: Firefox ESR < 115.6, Thunderbird < 115.6, Firefox < 121
Operating Systems: All platforms where affected versions run
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable when running in headless mode, but headless mode may be enabled by default in some automated/CI environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Browser crash (denial of service) or limited code execution within browser sandbox boundaries.

🟢

If Mitigated

No impact if patched or if headless mode is disabled in vulnerable versions.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious websites without user interaction beyond visiting the site.
🏢 Internal Only: MEDIUM - Requires user to visit malicious internal sites or click malicious links in emails.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires headless mode and specific conditions to trigger the buffer overflow. No public exploit code has been identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox ESR 115.6, Thunderbird 115.6, Firefox 121

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1864118

Restart Required: Yes

Instructions:

1. Update Firefox to version 121 or later. 2. Update Firefox ESR to version 115.6 or later. 3. Update Thunderbird to version 115.6 or later. 4. Restart the application after updating.

🔧 Temporary Workarounds

Disable headless mode

all

Prevent exploitation by disabling headless mode in vulnerable versions

Not applicable - configure via application settings or command-line flags

🧯 If You Can't Patch

  • Disable headless mode in all affected applications
  • Implement network filtering to block access to untrusted websites

🔍 How to Verify

Check if Vulnerable:

Check application version against affected versions: Firefox ESR < 115.6, Thunderbird < 115.6, Firefox < 121

Check Version:

Firefox/Thunderbird: Help → About Firefox/Thunderbird; Command line: firefox --version, thunderbird --version

Verify Fix Applied:

Confirm version is equal to or greater than patched versions: Firefox ESR >= 115.6, Thunderbird >= 115.6, Firefox >= 121

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process termination in headless mode

Network Indicators:

  • Unusual outbound connections from browser processes
  • Traffic to known malicious domains

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName contains 'firefox' OR ProcessName contains 'thunderbird' AND ExceptionCode=0xc0000005

🔗 References

📤 Share & Export