CVE-2024-2612

8.1 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in Firefox's SafeRefPtr component that could allow an attacker to trigger a crash or potentially execute arbitrary code. It affects Firefox versions before 124, Firefox ESR before 115.9, and Thunderbird before 115.9. Attackers could exploit this by tricking users into visiting malicious websites.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Firefox ESR
  • Mozilla Thunderbird
Versions: Firefox < 124, Firefox ESR < 115.9, Thunderbird < 115.9
Operating Systems: Windows, Linux, macOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or malware installation.

🟠

Likely Case

Browser crash (denial of service) or limited code execution within browser sandbox.

🟢

If Mitigated

No impact if patched or if exploit attempts are blocked by security controls.

🌐 Internet-Facing: HIGH - Web browsers are directly exposed to internet content and malicious websites.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires triggering specific code path in SafeRefPtr. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 124, Firefox ESR 115.9, Thunderbird 115.9

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-12/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update download and installation. 4. Restart browser when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript to prevent exploit delivery via malicious websites.

about:config → javascript.enabled = false

🧯 If You Can't Patch

  • Restrict browser usage to trusted websites only
  • Implement network filtering to block known malicious domains

🔍 How to Verify

Check if Vulnerable:

Check browser version in About dialog. If Firefox < 124, Firefox ESR < 115.9, or Thunderbird < 115.9, system is vulnerable.

Check Version:

firefox --version or thunderbird --version

Verify Fix Applied:

Confirm version is Firefox ≥124, Firefox ESR ≥115.9, or Thunderbird ≥115.9 in About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Browser crash reports
  • Unexpected process termination

Network Indicators:

  • Connections to suspicious domains followed by browser crashes

SIEM Query:

source="browser_logs" AND (event="crash" OR event="unexpected_exit")

🔗 References

📤 Share & Export