CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions in Mozilla Firefox
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
AI Analysis
Technical Summary
CVE-2024-8384 is a critical memory corruption vulnerability in the JavaScript garbage collector of Mozilla Firefox and Thunderbird. The issue arises when the garbage collector encounters out-of-memory (OOM) conditions at a precise moment between two garbage collection passes. Under these conditions, the garbage collector may mis-color cross-compartment objects, which means it incorrectly marks objects during the mark-and-sweep process. This mis-coloring can cause use-after-free or other memory corruption issues, potentially allowing an attacker to execute arbitrary code or cause a denial of service. The vulnerability affects Firefox versions prior to 130, Firefox ESR versions prior to 128.2 and 115.15, and Thunderbird versions prior to 128.2 and 115.15. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation (no privileges or user interaction required) and its impact on confidentiality, integrity, and availability. The underlying CWE is CWE-416 (Use After Free). Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of Firefox and Thunderbird. The flaw is rooted in the garbage collector's handling of cross-compartment references, which are objects shared between different JavaScript execution contexts, making the bug subtle and complex. Attackers could craft malicious web content to trigger the OOM condition and exploit the memory corruption to execute arbitrary code within the browser context.
Potential Impact
For European organizations, this vulnerability presents a critical risk as Firefox and Thunderbird are widely used across enterprises, government agencies, and critical infrastructure sectors. Exploitation could lead to full compromise of affected systems, including data theft, unauthorized access, and disruption of services. The ability to remotely exploit the vulnerability without user interaction or privileges increases the threat level, especially in environments where Firefox is used to access sensitive information or internal networks. The memory corruption could also be leveraged to bypass security controls or sandboxing mechanisms, amplifying the potential damage. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly vulnerable due to the sensitive nature of their data and the reliance on secure communications. Additionally, the vulnerability could be used as an initial attack vector for broader network compromise or espionage campaigns targeting European entities.
Mitigation Recommendations
1. Immediately plan to update Firefox and Thunderbird to versions 130 and 128.2 (or later ESR versions) once patches are released by Mozilla. 2. Until patches are available, consider deploying network-level protections such as web filtering to block access to untrusted or potentially malicious websites. 3. Monitor browser crash reports and memory usage patterns to detect anomalies that may indicate exploitation attempts involving OOM conditions. 4. Employ endpoint detection and response (EDR) solutions capable of identifying memory corruption exploits and unusual process behaviors related to Firefox and Thunderbird. 5. Educate users about the risks of visiting untrusted websites and opening suspicious links, even though no user interaction is required for exploitation, as reducing exposure lowers risk. 6. Review and harden browser sandboxing and compartmentalization settings where possible to limit the impact of potential exploitation. 7. Coordinate with IT asset management to inventory all Firefox and Thunderbird installations to ensure timely patch deployment across the organization. 8. Engage with Mozilla security advisories and subscribe to vulnerability notifications to stay informed about patch releases and exploit developments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions in Mozilla Firefox
Description
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
AI-Powered Analysis
Technical Analysis
CVE-2024-8384 is a critical memory corruption vulnerability in the JavaScript garbage collector of Mozilla Firefox and Thunderbird. The issue arises when the garbage collector encounters out-of-memory (OOM) conditions at a precise moment between two garbage collection passes. Under these conditions, the garbage collector may mis-color cross-compartment objects, which means it incorrectly marks objects during the mark-and-sweep process. This mis-coloring can cause use-after-free or other memory corruption issues, potentially allowing an attacker to execute arbitrary code or cause a denial of service. The vulnerability affects Firefox versions prior to 130, Firefox ESR versions prior to 128.2 and 115.15, and Thunderbird versions prior to 128.2 and 115.15. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation (no privileges or user interaction required) and its impact on confidentiality, integrity, and availability. The underlying CWE is CWE-416 (Use After Free). Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of Firefox and Thunderbird. The flaw is rooted in the garbage collector's handling of cross-compartment references, which are objects shared between different JavaScript execution contexts, making the bug subtle and complex. Attackers could craft malicious web content to trigger the OOM condition and exploit the memory corruption to execute arbitrary code within the browser context.
Potential Impact
For European organizations, this vulnerability presents a critical risk as Firefox and Thunderbird are widely used across enterprises, government agencies, and critical infrastructure sectors. Exploitation could lead to full compromise of affected systems, including data theft, unauthorized access, and disruption of services. The ability to remotely exploit the vulnerability without user interaction or privileges increases the threat level, especially in environments where Firefox is used to access sensitive information or internal networks. The memory corruption could also be leveraged to bypass security controls or sandboxing mechanisms, amplifying the potential damage. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly vulnerable due to the sensitive nature of their data and the reliance on secure communications. Additionally, the vulnerability could be used as an initial attack vector for broader network compromise or espionage campaigns targeting European entities.
Mitigation Recommendations
1. Immediately plan to update Firefox and Thunderbird to versions 130 and 128.2 (or later ESR versions) once patches are released by Mozilla. 2. Until patches are available, consider deploying network-level protections such as web filtering to block access to untrusted or potentially malicious websites. 3. Monitor browser crash reports and memory usage patterns to detect anomalies that may indicate exploitation attempts involving OOM conditions. 4. Employ endpoint detection and response (EDR) solutions capable of identifying memory corruption exploits and unusual process behaviors related to Firefox and Thunderbird. 5. Educate users about the risks of visiting untrusted websites and opening suspicious links, even though no user interaction is required for exploitation, as reducing exposure lowers risk. 6. Review and harden browser sandboxing and compartmentalization settings where possible to limit the impact of potential exploitation. 7. Coordinate with IT asset management to inventory all Firefox and Thunderbird installations to ensure timely patch deployment across the organization. 8. Engage with Mozilla security advisories and subscribe to vulnerability notifications to stay informed about patch releases and exploit developments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mozilla
- Date Reserved
- 2024-09-03T06:39:10.177Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a2e00f0ba78a050538d3f
Added to database: 11/4/2025, 4:46:56 PM
Last enriched: 11/4/2025, 4:50:39 PM
Last updated: 11/5/2025, 7:46:34 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12677: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mykiot KiotViet Sync
MediumCVE-2025-12676: CWE-259 Use of Hard-coded Password in mykiot KiotViet Sync
MediumCVE-2025-12675: CWE-862 Missing Authorization in mykiot KiotViet Sync
MediumCVE-2025-12674: CWE-434 Unrestricted Upload of File with Dangerous Type in mykiot KiotViet Sync
CriticalCVE-2025-12388: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Carousel Block – Responsive Image and Content Carousel
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.