Home Cyber Security Mozilla patches Firefox, Thunderbird towards zero-day exploited in assaults

Mozilla patches Firefox, Thunderbird towards zero-day exploited in assaults

0
Mozilla patches Firefox, Thunderbird towards zero-day exploited in assaults

[ad_1]

Mozilla

Mozilla launched emergency safety updates in the present day to repair a vital zero-day vulnerability exploited within the wild, impacting its Firefox internet browser and Thunderbird e-mail consumer.

Tracked as CVE-2023-4863, the safety flaw is attributable to a heap buffer overflow within the WebP code library (libwebp), whose affect spans from crashes to arbitrary code execution.

“Opening a malicious WebP picture might result in a heap buffer overflow within the content material course of. We’re conscious of this challenge being exploited in different merchandise within the wild,” Mozilla stated in an advisory revealed on Tuesday.

Mozilla addressed the exploited zero-day in Firefox 117.0.1, Firefox ESR 115.2.1, Firefox ESR 102.15.1, Thunderbird 102.15.1, and Thunderbird 115.2.2.

Regardless that particular particulars relating to the WebP flaw’s exploitation in assaults stay undisclosed, this vital vulnerability is being abused in real-world eventualities.

Therefore, customers are strongly suggested to put in up to date variations of Firefox and Thunderbird to safeguard their programs towards potential assaults.

Firefox 117.0.1

​As Mozilla revealed in in the present day’s safety advisory, the CVE-2023-4863 zero-day additionally impacts different software program utilizing the weak WebP code library model.

Certainly one of them is the Google Chrome internet browser, which was patched towards this flaw on Monday when Google warned that it is “conscious that an exploit for CVE-2023-4863 exists within the wild.”

The Chrome safety updates are rolling out to customers within the Secure and Prolonged steady channels and are anticipated to achieve the whole consumer base over the approaching days or even weeks.

Apple’s Safety Engineering and Structure (SEAR) workforce and The Citizen Lab on the College of Toronto’s Munk College had been those who reported the bug on September sixth.

The safety researchers at Citizen Lab even have a historical past of figuring out and disclosing zero-day vulnerabilities often exploited in focused espionage campaigns led by government-affiliated menace actors.

These campaigns usually give attention to people at vital danger of assault, together with journalists, opposition politicians, and dissidents.

On Thursday, Apple additionally patched two zero-days tagged by Citizen Lab as exploited within the wild as a part of an exploit chain dubbed BLASTPASS to deploy NSO Group’s Pegasus mercenary adware onto totally patched iPhones.

Immediately, the BLASTPASS patches had been additionally backported to older iPhone fashions, together with iPhone 6s fashions, the iPhone 7, and the primary era of iPhone SE.

[ad_2]