CVE-2024-3852

7.5 HIGH

📋 TL;DR

This vulnerability in Firefox, Firefox ESR, and Thunderbird occurs when the GetBoundName function returns an incorrect object version due to JIT optimization flaws. Attackers could exploit this to execute arbitrary code or cause memory corruption. All users of affected versions are at risk.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
Versions: Firefox < 125, Firefox ESR < 115.10, Thunderbird < 115.10
Operating Systems: All platforms where these applications run
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or malware installation.

🟠

Likely Case

Browser crash (denial of service) or limited memory corruption that could be leveraged for further attacks.

🟢

If Mitigated

Minimal impact if systems are patched, isolated, or have additional security controls like sandboxing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious web content but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 125, Firefox ESR 115.10, Thunderbird 115.10

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-18/

Restart Required: Yes

Instructions:

1. Open the application. 2. Go to Help > About Firefox/Thunderbird. 3. Allow the update to download and install. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents exploitation by disabling JavaScript execution in the browser.

Use Content Security Policy

all

Implement CSP headers to restrict script execution from untrusted sources.

🧯 If You Can't Patch

  • Restrict application use to trusted websites only.
  • Implement network segmentation to limit potential lateral movement.

🔍 How to Verify

Check if Vulnerable:

Check the application version in Help > About Firefox/Thunderbird.

Check Version:

firefox --version or thunderbird --version

Verify Fix Applied:

Confirm version is Firefox >=125, Firefox ESR >=115.10, or Thunderbird >=115.10.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs
  • Unexpected process termination

Network Indicators:

  • Suspicious web traffic to known exploit domains

SIEM Query:

source="firefox.log" AND (event="crash" OR event="segfault")

🔗 References

📤 Share & Export