Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10464: History interface could have been used to cause a Denial of Service condition in the browser in Mozilla Firefox

0
High
VulnerabilityCVE-2024-10464cvecve-2024-10464
Published: Tue Oct 29 2024 (10/29/2024, 12:19:14 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:14:00 UTC

Technical Analysis

CVE-2024-10464 is a vulnerability identified in Mozilla Firefox and Thunderbird that allows an attacker to cause a Denial of Service (DoS) condition by repeatedly writing to the browser's history interface attributes. This abuse leads to resource exhaustion, causing the browser to become unresponsive or crash. The flaw exists because the history interface lacked sufficient rate-limiting controls, enabling an attacker to overwhelm the browser's internal state. The vulnerability affects Firefox versions earlier than 132 and Thunderbird versions earlier than 128.4. Exploitation requires no privileges or user interaction and can be triggered remotely by visiting a maliciously crafted web page. Mozilla mitigated the issue by introducing rate-limiting mechanisms to the history API, preventing excessive writes from impacting browser stability. The CVSS v3.1 base score is 7.5, reflecting a network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability. There are no known exploits in the wild at the time of publication, but the vulnerability poses a significant risk to browser availability and user productivity. The CWE classification is CWE-125, indicating an out-of-bounds write or similar memory corruption leading to DoS. This vulnerability is particularly relevant for organizations relying on Firefox and Thunderbird for daily operations, as it can disrupt access to web resources and email communications.

Potential Impact

For European organizations, this vulnerability can lead to significant operational disruptions. Firefox and Thunderbird are widely used across Europe for web browsing and email communication, including in government, financial, healthcare, and critical infrastructure sectors. A successful DoS attack could render browsers or email clients unresponsive, impacting employee productivity and potentially delaying critical communications. In sectors where browser availability is essential for accessing cloud services or web-based applications, this could translate into broader business continuity issues. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can cause cascading effects, especially in environments with strict uptime requirements. Additionally, the ease of exploitation without authentication or user interaction increases the risk of automated or large-scale attacks targeting European networks. Organizations with remote or hybrid workforces relying on these applications are particularly vulnerable to disruption. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should prioritize updating Mozilla Firefox to version 132 or later and Thunderbird to version 128.4 or later to ensure the vulnerability is patched. Network administrators should monitor browser and email client logs for unusual spikes in history API usage or resource consumption that could indicate attempted exploitation. Implementing web filtering to block access to suspicious or untrusted websites can reduce exposure to malicious pages designed to trigger this DoS. Security teams should educate users about the importance of applying updates promptly and consider deploying browser hardening configurations that limit script execution on untrusted sites. For managed environments, automated patch management systems should be used to enforce timely updates. Additionally, organizations can deploy endpoint detection and response (EDR) tools to identify abnormal application behavior consistent with resource exhaustion attacks. Regular backups and incident response plans should be reviewed to ensure rapid recovery from potential service disruptions. Finally, collaboration with Mozilla’s security advisories and threat intelligence feeds will help maintain awareness of any emerging exploit activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2024-10-28T14:23:18.509Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092615fe7723195e0b3569

Added to database: 11/3/2025, 10:00:53 PM

Last enriched: 11/3/2025, 11:14:00 PM

Last updated: 11/5/2025, 1:53:12 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats