CVE-2024-3302

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

01 Apr 2025, 13:39

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1881183 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1881183 - Issue Tracking
References () https://www.mozilla.org/security/advisories/mfsa2024-18/ - () https://www.mozilla.org/security/advisories/mfsa2024-18/ - Vendor Advisory
References () https://kb.cert.org/vuls/id/421644 - () https://kb.cert.org/vuls/id/421644 - US Government Resource
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html - Mailing List
References () https://www.mozilla.org/security/advisories/mfsa2024-19/ - () https://www.mozilla.org/security/advisories/mfsa2024-19/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-20/ - () https://www.mozilla.org/security/advisories/mfsa2024-20/ - Vendor Advisory
First Time Mozilla thunderbird
Mozilla
Mozilla firefox
CWE CWE-770
CPE cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*

24 Apr 2024, 10:15

Type Values Removed Values Added
References
  • () https://www.mozilla.org/security/advisories/mfsa2024-20/ -
Summary There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125 and Firefox ESR < 115.10. There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

22 Apr 2024, 10:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html -

19 Apr 2024, 11:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html -

16 Apr 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 16:15

Updated : 2025-04-01 13:39


NVD link : CVE-2024-3302

Mitre link : CVE-2024-3302


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
CWE
CWE-770

Allocation of Resources Without Limits or Throttling