{ "schema_version": "1.4.0", "id": "GHSA-phv6-6pfh-prxc", "modified": "2024-04-04T07:34:49Z", "published": "2023-09-11T09:31:45Z", "aliases": [ "CVE-2023-4578" ], "details": "When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4578" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839007" }, { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2023-34" }, { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2023-36" }, { "type": "WEB", "url": "https://www.mozilla.org/security/advisories/mfsa2023-38" } ], "database_specific": { "cwe_ids": [ "CWE-770" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-09-11T09:15:09Z" } }