Mozilla fixes Firefox zero-day actively exploited in assaults

Mozilla has issued an emergency safety replace for the Firefox browser to handle a essential use-after-free vulnerability that’s at the moment exploited in assaults.

The vulnerability, tracked as CVE-2024-9680, and found by ESET researcher Damien Schaeffer, is a use-after-free in Animation timelines.

This sort of flaw happens when reminiscence that has been freed remains to be utilized by this system, permitting malicious actors so as to add their very own malicious knowledge to the reminiscence area to carry out code execution.

Animation timelines, a part of Firefox’s Internet Animations API, are a mechanism that controls and synchronizes animations on internet pages.

“An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines,” reads the safety bulletin.

“We have had reports of this vulnerability being exploited in the wild.”

The vulnerability impacts the most recent Firefox (commonplace launch) and the prolonged assist releases (ESR).

Fixes have been made obtainable within the beneath variations, which customers are really helpful to improve to instantly:

  • Firefox 131.0.2
  • Firefox ESR 115.16.1
  • Firefox ESR 128.3.1

Given the lively exploitation standing for CVE-2024-9680 and the shortage of any data on how persons are focused, upgrading to the most recent variations is important.

To improve to the most recent model, launch Firefox and go to Settings -> Assist -> About Firefox, and the replace ought to begin robotically. A restart of this system will likely be required for the modifications to use.

Updating Firefox
Updating Firefox
Supply: BleepingComputer

BleepingComputer has contacted each Mozilla and ESET to be taught extra in regards to the vulnerability, the way it’s being exploited, and towards whom, and we are going to replace this submit once we obtain extra data.

All through 2024, to date, Mozilla needed to repair zero-day vulnerabilities on Firefox solely as soon as.

On March 22, the web firm launched safety updates to handle CVE-2024-29943 and CVE-2024-29944, each critical-severity points found and demonstrated by Manfred Paul in the course of the Pwn2Own Vancouver 2024 hacking competitors.

Recent articles

How AI Is Reworking IAM and Id Safety

Lately, synthetic intelligence (AI) has begun revolutionizing Id Entry...

Vietnamese Hacker Group Deploys New PXA Stealer Focusing on Europe and Asia

î ‚Nov 15, 2024î „Ravie LakshmananMalware / Credential Theft A Vietnamese-speaking risk...

Excessive-Severity Flaw in PostgreSQL Permits Hackers to Exploit Surroundings Variables

î ‚Nov 15, 2024î „Ravie LakshmananVulnerability / Database Safety Cybersecurity researchers have...

CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Assault Confirmed

î ‚Nov 15, 2024î „Ravie LakshmananCommunity Safety / Vulnerability The U.S. Cybersecurity...