Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-01/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-02/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-03/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1742382 | vendor advisory issue tracking exploit |