CVE-2024-4770
📋 TL;DR
A use-after-free vulnerability in Firefox, Firefox ESR, and Thunderbird occurs when saving pages to PDF with certain font styles, potentially causing application crashes. This could allow attackers to execute arbitrary code or cause denial of service. Affected users include those running vulnerable versions of these Mozilla applications.
💻 Affected Systems
- Firefox
- Firefox ESR
- Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or malware installation.
Likely Case
Application crash (denial of service) or limited memory corruption.
If Mitigated
No impact if patched or if PDF saving functionality is disabled.
🎯 Exploit Status
Exploitation requires user interaction to save a malicious page as PDF. No public exploit code is known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 126+, Firefox ESR 115.11+, Thunderbird 115.11+
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-21/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update. 4. Restart when prompted.
🔧 Temporary Workarounds
Disable PDF saving
allPrevent users from saving pages as PDF through policy or configuration.
🧯 If You Can't Patch
- Disable or restrict PDF saving functionality in affected applications.
- Use alternative browsers/email clients until patches can be applied.
🔍 How to Verify
Check if Vulnerable:
Check application version against affected ranges: Firefox < 126, Firefox ESR < 115.11, Thunderbird < 115.11.
Check Version:
firefox --version (Linux) or Help → About Firefox (GUI)
Verify Fix Applied:
Confirm version is Firefox ≥126, Firefox ESR ≥115.11, or Thunderbird ≥115.11.
📡 Detection & Monitoring
Log Indicators:
- Application crash logs mentioning PDF generation or font handling
- Unexpected process termination of Firefox/Thunderbird
Network Indicators:
- Unusual PDF generation requests to web servers
SIEM Query:
source="firefox.log" AND "crash" AND "pdf"
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1893270
- https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html
- https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html
- https://www.mozilla.org/security/advisories/mfsa2024-21/
- https://www.mozilla.org/security/advisories/mfsa2024-22/
- https://www.mozilla.org/security/advisories/mfsa2024-23/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1893270
- https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html
- https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html
- https://www.mozilla.org/security/advisories/mfsa2024-21/
- https://www.mozilla.org/security/advisories/mfsa2024-22/
- https://www.mozilla.org/security/advisories/mfsa2024-23/