If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.
This bug only affects Firefox on Windows when run in non-standard configurations (such as using runas). Other operating systems are unaffected. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "118"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.3"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-5174.json"