![]() ![]() Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system. The vulnerability exists due to a boundary error in JIT UpdateRegExpStatics when UpdateRegExpStatics attempted to access initialStringHeap. Technical details Latest version: 115.4.3 File name: Thunderbird Setup 115.4.3.exe MD5 checksum: D7832472C9700F1CA6F83A2FC6A1AA9E File size: 55.12 MB. Is there known malware, which exploits this vulnerability? Check out the notes below for this version of Thunderbird. Note, the vulnerability affects Firefox installations on Windows only. Version 115.4.2, first offered to channel users on November 6, 2023. A remote attacker can trick the victim to visit a specially crafted website, trigger an integer overflow and execute arbitrary code on the target system. The vulnerability exists due to integer overflow in RecordedSourceSurfaceCreation. ![]() The vulnerability allows a remote attacker to execute arbitrary code on the target system. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |