Mozilla on Tuesday released security updates to resolve a critical zero-day vulnerability in Firefox and Thunderbird that has been actively exploited in the wild, a day after Google released a fix for the issue in its Chrome browser.
The shortcoming, assigned the identifier CVE-2023-4863, is a heap buffer overflow flaw in the WebP image format that could result in arbitrary code execution when processing a specially crafted image.
“Opening a malicious WebP image could lead to a heap buffer overflow in the content process,” Mozilla said in an advisory. “We are aware of this issue being exploited in other products in the wild.”
According to the description on the National Vulnerability Database (NVD), the flaw could allow a remote attacker to perform an out-of-bounds memory write via a crafted HTML page.
Apple Security Engineering and Architecture (SEAR) and the Citizen Lab at The University of Toronto’s Munk School have been credited with reporting the security issue. It has been addressed in Firefox 117.0.1, Firefox ESR 115.2.1, Firefox ESR 102.15.1, Thunderbird 102.15.1, and Thunderbird 115.2.2.
Way Too Vulnerable: Uncovering the State of the Identity Attack Surface
Achieved MFA? PAM? Service account protection? Find out how well-equipped your organization truly is against identity threats
The development comes a day after Google released fixes for the same flaw in Chrome, noting it’s “aware that an exploit for CVE-2023-4863 exists in the wild.”
Last week, Apple also released patches to plug two actively exploited security holes that the Citizen Lab said have been weaponized as part of a zero-click iMessage exploit chain named BLASTPASS to deploy the Pegasus spyware on fully-patched iPhones running iOS 16.6.
While specific details regarding the flaws’ exploitation remain unknown, it’s suspected that they are all being leveraged to target individuals who are at an elevated risk, such as activists, dissidents, and journalists.