CVE-2024-6609
📋 TL;DR
A use-after-free vulnerability in Firefox and Thunderbird occurs when the browser is nearly out of memory, causing an elliptic curve key that was never properly allocated to be freed incorrectly. This can lead to memory corruption and potential code execution. Affects Firefox versions before 128 and Thunderbird versions before 128.
💻 Affected Systems
- Mozilla Firefox
- Mozilla Thunderbird
📦 What is this software?
Firefox by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution allowing an attacker to take full control of the affected system.
Likely Case
Browser crash leading to denial of service or limited memory corruption.
If Mitigated
No impact if patched or if memory conditions don't trigger the vulnerability.
🎯 Exploit Status
Requires specific memory conditions to trigger, making reliable exploitation challenging.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 128, Thunderbird 128
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-29/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update to version 128 or higher. 4. Restart the application.
🔧 Temporary Workarounds
Memory limit adjustment
allIncrease available memory to reduce likelihood of triggering low-memory condition
Disable JavaScript
allReduce attack surface by disabling JavaScript (impacts functionality)
🧯 If You Can't Patch
- Restrict browser usage to trusted websites only
- Implement application whitelisting to prevent unauthorized browser execution
🔍 How to Verify
Check if Vulnerable:
Check browser version in About dialog - if Firefox < 128 or Thunderbird < 128, vulnerable.
Check Version:
firefox --version or thunderbird --version
Verify Fix Applied:
Confirm version is Firefox ≥ 128 or Thunderbird ≥ 128 in About dialog.
📡 Detection & Monitoring
Log Indicators:
- Browser crash logs with memory corruption signatures
- Unexpected process termination
Network Indicators:
- Unusual outbound connections following browser crashes
SIEM Query:
Process termination where process_name contains 'firefox' OR process_name contains 'thunderbird' AND exit_code != 0
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
- https://www.mozilla.org/security/advisories/mfsa2024-29/
- https://www.mozilla.org/security/advisories/mfsa2024-32/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
- https://lists.debian.org/debian-lts-announce/2024/10/msg00028.html
- https://www.mozilla.org/security/advisories/mfsa2024-29/
- https://www.mozilla.org/security/advisories/mfsa2024-32/