In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. *This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (`network.http.altsvc.oe`) is enabled.* This vulnerability affects Firefox < 118.
En una configuración no estándar de Firefox, podría haberse producido un desbordamiento de enteros basado en el tráfico de la red (posiblemente bajo la influencia de una página web local sin privilegios), lo que habría provocado una escritura fuera de límites en la memoria del proceso privilegiado. *Este error solo afecta a Firefox si está habilitada una preferencia no estándar que permite servicios alternativos no HTTPS (`network.http.altsvc.oe`).* Esta vulnerabilidad afecta a Firefox versión < 118.
USN-6404-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Ronald Crane discovered that Firefox did not properly manage memory when non-HTTPS Alternate Services is enabled. An attacker could potentially exploit this issue to cause a denial of service. Clément Lecigne discovered that Firefox did not properly manage memory when handling VP8 media stream. An attacker-controlled VP8 media stream could lead to a heap buffer overflow in the content process, resulting in a denial of service, or possibly execute arbitrary code.