×

High-Severity Mozilla Flaws Allow Remote Code Execution

Mozilla has released Firefox 142 to address multiple critical security vulnerabilities that could enable remote attackers to execute arbitrary code on affected systems.

The Mozilla Foundation Security Advisory 2025-64, announced on August 19, 2025, details nine distinct vulnerabilities ranging from high-severity remote code execution flaws to spoofing and denial-of-service issues.

Critical Remote Code Execution Vulnerabilities

The most concerning vulnerabilities involve memory safety bugs that could potentially allow remote code execution.

CVE ID Impact Description
CVE-2025-9179 High Sandbox escape due to invalid pointer
CVE-2025-9180 High Same-origin policy bypass
CVE-2025-9181 Moderate Uninitialized memory
CVE-2025-9182 Low Denial-of-service due to out-of-memory
CVE-2025-9183 Low Spoofing issue
CVE-2025-9186 Low Spoofing issue
CVE-2025-9187 High Memory corruption bugs
CVE-2025-9184 High Memory corruption bugs (ESR versions)
CVE-2025-9185 High Memory corruption bugs (multiple ESR versions)

Three separate memory safety CVEs affect different combinations of Firefox and Thunderbird versions, with researchers demonstrating evidence of memory corruption that could be exploited by skilled attackers.

CVE-2025-9187 addresses memory safety bugs specifically fixed in Firefox 142 and Thunderbird 142, while CVE-2025-9184 impacts a broader range including Firefox ESR 140.2 and Thunderbird ESR 140.2.

The most extensive vulnerability, CVE-2025-9185, affects multiple Extended Support Release versions dating back to Firefox ESR 115.26, highlighting the widespread nature of these memory corruption issues.

Among the high-severity individual flaws, CVE-2025-9179 presents a particularly dangerous sandbox escape vulnerability in the Audio/Video GMP component.

Reported by researcher Oskar, this flaw allows attackers to perform memory corruption in the heavily sandboxed GMP process that handles encrypted media, potentially escalating privileges beyond typical content process restrictions.

Additionally, CVE-2025-9180, discovered by Tom Van Goethem, enables same-origin policy bypass in the Graphics Canvas2D component, potentially allowing malicious websites to access resources from other domains without proper authorization.

Organizations and individual users should immediately update to Firefox 142 to protect against these vulnerabilities.

The combination of sandbox escape capabilities and memory corruption flaws creates a significant attack surface that could be exploited through malicious websites or compromised content, making rapid deployment of this security update critical for maintaining browser security.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!

Post Comment