CVE-2024-10464
📋 TL;DR
This vulnerability allows attackers to cause browser denial-of-service by repeatedly writing to history interface attributes. It affects Firefox, Firefox ESR, and Thunderbird users running outdated versions. The issue was resolved by implementing rate-limiting on the affected API.
💻 Affected Systems
- Firefox
- Firefox ESR
- Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Complete browser crash or unresponsiveness, potentially disrupting user workflows and causing data loss in unsaved sessions.
Likely Case
Browser becomes temporarily unresponsive or crashes, requiring restart and losing active tabs/sessions.
If Mitigated
Minimal impact with proper patching; rate-limiting prevents exploitation while maintaining functionality.
🎯 Exploit Status
Exploitation requires user to visit malicious webpage but no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 132+, Firefox ESR 128.4+, Thunderbird 128.4+, Thunderbird 132+
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-55/
Restart Required: Yes
Instructions:
1. Open affected application. 2. Go to Help > About Firefox/Thunderbird. 3. Allow automatic update check and installation. 4. Restart application when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation by blocking JavaScript execution, which would be required to trigger the vulnerability.
Use Content Security Policy
allImplement CSP headers to restrict script execution from untrusted sources.
🧯 If You Can't Patch
- Use alternative browsers/email clients until patching possible.
- Implement network filtering to block known malicious domains hosting exploit code.
🔍 How to Verify
Check if Vulnerable:
Check application version against affected ranges: Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, Thunderbird < 132.
Check Version:
Firefox/Thunderbird: Help > About Firefox/Thunderbird
Verify Fix Applied:
Confirm application version is at or above patched versions: Firefox ≥ 132, Firefox ESR ≥ 128.4, Thunderbird ≥ 128.4 or ≥ 132.
📡 Detection & Monitoring
Log Indicators:
- Multiple rapid writes to history API in short timeframe
- Browser crash logs with history-related stack traces
Network Indicators:
- Requests to domains hosting known exploit code for this CVE
SIEM Query:
source="browser_logs" AND (event="history_api_abuse" OR event="browser_crash" AND reason="history_interface")
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1913000
- https://www.mozilla.org/security/advisories/mfsa2024-55/
- https://www.mozilla.org/security/advisories/mfsa2024-56/
- https://www.mozilla.org/security/advisories/mfsa2024-58/
- https://www.mozilla.org/security/advisories/mfsa2024-59/
- https://lists.debian.org/debian-lts-announce/2024/10/msg00034.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00001.html