
Cloud Vulnerability DB
A community-led vulnerabilities database
The WebGL DrawElementsInstanced method was found to be vulnerable to a heap buffer overflow when used on systems with the Mesa VM driver. This vulnerability, tracked as CVE-2023-6856, was discovered in December 2023 and affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121 (Mozilla Advisory, NVD).
The vulnerability is classified as a heap buffer overflow in the WebGL DrawElementsInstanced method specifically when running on systems using the Mesa VM driver. The issue has been assigned a CVSS v3.1 base score of 8.8 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating a high severity vulnerability that requires user interaction but no privileges for exploitation (NVD).
This vulnerability could allow an attacker to perform remote code execution and sandbox escape, potentially compromising the security of the affected system. The high CVSS score reflects the serious potential impact, with possible consequences including unauthorized code execution and escape from browser security controls (Mozilla Advisory).
The vulnerability has been patched in Firefox 121.0, Firefox ESR 115.6, and Thunderbird 115.6. Users are strongly advised to upgrade to these or later versions to mitigate the risk. Various Linux distributions have also released security updates to address this vulnerability, including Debian, Ubuntu, and Red Hat (Debian Advisory, Ubuntu Security, Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."