CVE-2024-6604
📋 TL;DR
This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruption. With sufficient effort, attackers could potentially exploit these vulnerabilities to execute arbitrary code on affected systems. All users running vulnerable versions of Firefox (<128, ESR <115.13) or Thunderbird (<115.13, <128) are at risk.
💻 Affected Systems
- Mozilla Firefox
- Mozilla Firefox ESR
- Mozilla Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution allowing attackers to take complete control of the affected system, install malware, steal data, or pivot to other systems.
Likely Case
Browser/application crashes (denial of service) or limited memory corruption leading to information disclosure.
If Mitigated
No impact if systems are patched or if exploit attempts are blocked by security controls like application allowlisting or network filtering.
🎯 Exploit Status
Memory corruption vulnerabilities typically require sophisticated exploitation techniques. No public exploits have been reported, but Mozilla presumes some could be exploited with enough effort.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 128, Firefox ESR 115.13, Thunderbird 115.13, Thunderbird 128
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-29/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update to complete. 4. Restart the application when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily reduces attack surface by disabling JavaScript execution, though this breaks most web functionality.
about:config → javascript.enabled = false
🧯 If You Can't Patch
- Restrict network access to vulnerable browsers using firewall rules or proxy policies.
- Implement application control to prevent execution of unauthorized processes from browser contexts.
🔍 How to Verify
Check if Vulnerable:
Check browser version: Firefox → Help → About Firefox; Thunderbird → Help → About Thunderbird.
Check Version:
firefox --version || thunderbird --version
Verify Fix Applied:
Confirm version is Firefox ≥128, Firefox ESR ≥115.13, or Thunderbird ≥115.13/128.
📡 Detection & Monitoring
Log Indicators:
- Unexpected browser crashes
- Memory access violation events in system logs
- Suspicious child processes spawned from browser
Network Indicators:
- Unusual outbound connections from browser processes
- Traffic to known exploit hosting domains
SIEM Query:
process_name:firefox.exe AND (event_id:1000 OR event_id:1001) OR process_name:thunderbird.exe AND (event_id:1000 OR event_id:1001)
🔗 References
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266
- https://www.mozilla.org/security/advisories/mfsa2024-29/
- https://www.mozilla.org/security/advisories/mfsa2024-30/
- https://www.mozilla.org/security/advisories/mfsa2024-31/
- https://www.mozilla.org/security/advisories/mfsa2024-32/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266
- https://www.mozilla.org/security/advisories/mfsa2024-29/
- https://www.mozilla.org/security/advisories/mfsa2024-30/
- https://www.mozilla.org/security/advisories/mfsa2024-31/
- https://www.mozilla.org/security/advisories/mfsa2024-32/