Skip to main content

CVE-2023-5174: Double-free in process spawning on Windows in Mozilla Firefox

Critical
VulnerabilityCVE-2023-5174cvecve-2023-5174
Published: Wed Sep 27 2023 (09/27/2023, 14:13:19 UTC)
Source: CVE
Vendor/Project: Mozilla
Product: Firefox

Description

If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. *This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

AI-Powered Analysis

AILast updated: 07/03/2025, 13:42:27 UTC

Technical Analysis

CVE-2023-5174 is a critical vulnerability identified in Mozilla Firefox versions prior to 118 and Firefox ESR versions prior to 115.3, as well as Thunderbird versions prior to 115.3, specifically affecting Windows platforms. The vulnerability arises from a double-free condition in the sandbox process spawning code when Windows fails to duplicate a handle during process creation. In such cases, the sandbox code may inadvertently free a pointer twice, leading to a use-after-free scenario. This memory corruption flaw can cause a crash and potentially allow an attacker to execute arbitrary code or escalate privileges. Notably, this vulnerability only manifests under non-standard configurations of Firefox on Windows, such as when the browser is launched using the 'runas' command, which alters the process creation behavior. Other operating systems running Firefox or Thunderbird are not affected by this issue. The vulnerability is classified under CWE-416 (Use After Free) and has been assigned a CVSS v3.1 base score of 9.8, indicating a critical severity level. The attack vector is network-based with no privileges or user interaction required, and successful exploitation could compromise confidentiality, integrity, and availability of the affected system. As of the published date, no known exploits are reported in the wild, but the high severity and ease of exploitation warrant immediate attention and patching once updates are available from Mozilla.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Firefox or Thunderbird on Windows systems in enterprise environments. Exploitation could lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive information, or disrupt services. Given the critical CVSS score and the lack of required user interaction or privileges, attackers could remotely exploit this flaw to gain unauthorized access or deploy malware. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the potential for data breaches and operational disruptions. The fact that the vulnerability only triggers under non-standard configurations (e.g., use of 'runas') may limit exposure somewhat, but custom or legacy deployment scenarios common in enterprises could still be vulnerable. Additionally, the use-after-free nature of the bug could be leveraged for sophisticated exploitation techniques, increasing the threat level. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity necessitates urgent remediation to prevent future attacks.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediately audit Firefox and Thunderbird deployments on Windows to identify versions below 118 and 115.3 respectively, especially focusing on instances launched with non-standard configurations such as 'runas'. 2) Apply Mozilla's security updates as soon as they are released to remediate the vulnerability. 3) Temporarily avoid using non-standard process spawning methods for Firefox on Windows until patches are applied. 4) Implement application whitelisting and sandboxing to limit the impact of potential exploitation. 5) Monitor network and endpoint logs for unusual process creation events or crashes related to Firefox or Thunderbird. 6) Educate IT and security teams about this specific vulnerability to ensure rapid response. 7) Consider deploying endpoint detection and response (EDR) tools capable of detecting use-after-free exploitation attempts. 8) Maintain regular backups and incident response plans to mitigate potential damage from exploitation. These targeted actions go beyond generic advice by focusing on the unique conditions under which this vulnerability is exploitable and the specific software versions affected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2023-09-25T15:03:43.655Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc8da

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 1:42:27 PM

Last updated: 8/16/2025, 10:45:29 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats