
Cloud Vulnerability DB
A community-led vulnerabilities database
An out-of-bounds read vulnerability (CVE-2023-4048) was discovered in Firefox's DOMParser functionality that could lead to an exploitable crash when parsing HTML in low memory situations. The vulnerability affects Firefox versions prior to 116, Firefox ESR versions prior to 102.14, and Firefox ESR versions prior to 115.1. This security issue was reported by Irvan Kurniawan and was fixed in August 2023 (Mozilla Advisory).
The vulnerability occurs in the DOMParser.parseFromString function when processing HTML innerHTML with mimeType text/html under low virtual memory conditions. The issue manifests in mozilla::dom::Element::BindToTree after a realloc failure in AttrArray::GrowBy. When newImpl becomes nullptr due to the realloc failure, NSENSURETRUE returns false, leading to an out-of-bounds read at various memory addresses (Mozilla Advisory, Bugzilla).
The vulnerability has been rated as high severity with a CVSS v3.1 base score of 7.5. When successfully exploited, it could lead to a crash of the application and potential arbitrary code execution through memory corruption (NVD).
The vulnerability has been fixed in Firefox 116, Firefox ESR 102.14, and Firefox ESR 115.1. Users are advised to upgrade to these or later versions. The fix involves proper handling of memory allocation failures in the AttrArray implementation to prevent memory leaks (Mozilla Advisory, Debian Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."