CVE-2024-8384
📋 TL;DR
A critical memory corruption vulnerability in Mozilla's JavaScript garbage collector could allow attackers to execute arbitrary code or cause denial of service. This affects Firefox, Firefox ESR, and Thunderbird when specific out-of-memory conditions occur during garbage collection passes. All users of affected versions are at risk.
💻 Affected Systems
- Firefox
- Firefox ESR
- Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox Esr by Mozilla
Firefox Esr by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Browser/application crash (denial of service) or limited memory corruption allowing information disclosure.
If Mitigated
No impact if patched; limited impact if exploit attempts are blocked by security controls.
🎯 Exploit Status
Exploitation requires triggering specific OOM conditions during garbage collection, which may be challenging but feasible for skilled attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 130, Firefox ESR 128.2, Firefox ESR 115.15, Thunderbird 128.2, Thunderbird 115.15
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-39/
Restart Required: Yes
Instructions:
1. Open the affected application. 2. Go to Help > About Firefox/Thunderbird. 3. Allow the application to check for and install updates. 4. Restart the application when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation by disabling JavaScript execution, but breaks most web functionality.
about:config > javascript.enabled = false
🧯 If You Can't Patch
- Restrict access to untrusted websites and email content
- Deploy application control to block execution of vulnerable versions
🔍 How to Verify
Check if Vulnerable:
Check application version against affected versions list.
Check Version:
Firefox/Thunderbird: about:support or Help > About
Verify Fix Applied:
Confirm version is equal to or greater than patched versions.
📡 Detection & Monitoring
Log Indicators:
- Application crash logs with memory corruption signatures
- Unexpected process termination
Network Indicators:
- Traffic to known malicious domains hosting exploit code
SIEM Query:
source="firefox.log" OR source="thunderbird.log" AND (event="crash" OR event="segfault")
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1911288
- https://www.mozilla.org/security/advisories/mfsa2024-39/
- https://www.mozilla.org/security/advisories/mfsa2024-40/
- https://www.mozilla.org/security/advisories/mfsa2024-41/
- https://www.mozilla.org/security/advisories/mfsa2024-43/
- https://www.mozilla.org/security/advisories/mfsa2024-44/
- https://lists.debian.org/debian-lts-announce/2024/09/msg00012.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00025.html