If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. *This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
2023-09-27T15:19:42.457
2025-05-05T15:15:53.537
Modified
CVSSv3.1: 9.8 (CRITICAL)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | mozilla | firefox | < 118 | Yes |
| Application | mozilla | firefox_esr | < 115.3 | Yes |
| Application | mozilla | thunderbird | < 115.3 | Yes |
| Operating System | microsoft | windows | - | No |