Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions in Mozilla Firefox

0
Critical
VulnerabilityCVE-2024-8384cvecve-2024-8384
Published: Tue Sep 03 2024 (09/03/2024, 12:32:18 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:50:39 UTC

Technical Analysis

CVE-2024-8384 is a critical memory corruption vulnerability in the JavaScript garbage collector of Mozilla Firefox and Thunderbird. The issue arises when the garbage collector encounters out-of-memory (OOM) conditions at a precise moment between two garbage collection passes. Under these conditions, the garbage collector may mis-color cross-compartment objects, which means it incorrectly marks objects during the mark-and-sweep process. This mis-coloring can cause use-after-free or other memory corruption issues, potentially allowing an attacker to execute arbitrary code or cause a denial of service. The vulnerability affects Firefox versions prior to 130, Firefox ESR versions prior to 128.2 and 115.15, and Thunderbird versions prior to 128.2 and 115.15. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation (no privileges or user interaction required) and its impact on confidentiality, integrity, and availability. The underlying CWE is CWE-416 (Use After Free). Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of Firefox and Thunderbird. The flaw is rooted in the garbage collector's handling of cross-compartment references, which are objects shared between different JavaScript execution contexts, making the bug subtle and complex. Attackers could craft malicious web content to trigger the OOM condition and exploit the memory corruption to execute arbitrary code within the browser context.

Potential Impact

For European organizations, this vulnerability presents a critical risk as Firefox and Thunderbird are widely used across enterprises, government agencies, and critical infrastructure sectors. Exploitation could lead to full compromise of affected systems, including data theft, unauthorized access, and disruption of services. The ability to remotely exploit the vulnerability without user interaction or privileges increases the threat level, especially in environments where Firefox is used to access sensitive information or internal networks. The memory corruption could also be leveraged to bypass security controls or sandboxing mechanisms, amplifying the potential damage. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly vulnerable due to the sensitive nature of their data and the reliance on secure communications. Additionally, the vulnerability could be used as an initial attack vector for broader network compromise or espionage campaigns targeting European entities.

Mitigation Recommendations

1. Immediately plan to update Firefox and Thunderbird to versions 130 and 128.2 (or later ESR versions) once patches are released by Mozilla. 2. Until patches are available, consider deploying network-level protections such as web filtering to block access to untrusted or potentially malicious websites. 3. Monitor browser crash reports and memory usage patterns to detect anomalies that may indicate exploitation attempts involving OOM conditions. 4. Employ endpoint detection and response (EDR) solutions capable of identifying memory corruption exploits and unusual process behaviors related to Firefox and Thunderbird. 5. Educate users about the risks of visiting untrusted websites and opening suspicious links, even though no user interaction is required for exploitation, as reducing exposure lowers risk. 6. Review and harden browser sandboxing and compartmentalization settings where possible to limit the impact of potential exploitation. 7. Coordinate with IT asset management to inventory all Firefox and Thunderbird installations to ensure timely patch deployment across the organization. 8. Engage with Mozilla security advisories and subscribe to vulnerability notifications to stay informed about patch releases and exploit developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2024-09-03T06:39:10.177Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2e00f0ba78a050538d3f

Added to database: 11/4/2025, 4:46:56 PM

Last enriched: 11/4/2025, 4:50:39 PM

Last updated: 11/5/2025, 7:46:34 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats