Closed Bug 1924189 Opened 7 months ago Closed 6 months ago

[#5, Incomplete patch and variant vulnerabilities of 1914707] Parent Process (Unsandboxed) Out-Of-Bounds Write on WebGL Finish

Categories

(Core :: Graphics: CanvasWebGL, defect)

Firefox 131
ARM64
macOS
defect

Tracking

()

RESOLVED DUPLICATE of bug 1924184
Tracking Status
firefox-esr115 --- fixed
firefox-esr128 --- fixed
firefox131 --- wontfix
firefox132 --- wontfix
firefox133 --- fixed
firefox134 --- fixed

People

(Reporter: d4ni31, Unassigned)

References

Details

(4 keywords, Whiteboard: [Disclosure deadline 2025-01-10])

Attachments

(1 file)

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36

Steps to reproduce:

High-level overview of the vulnerability and the possible effect of using it

  • A Out-Of-Bounds Write Vulnerability exists in the WebGL Finish.

  • An attacker must open a arbitrary generated HTML file to exploit this vulnerability.

  • Exploiting this vulnerability can lead to a privileged process (GPU Process), enabling a sandbox escape.

    • like : CVE-2023-6856 => Heap-Buffer-Overflow Sandbox Escape in Mozilla Firefox WebGL

Exact product that was found to be vulnerable including complete version information

  • OS : macOS Beta 15.1 (24B5070a) => Apple Macbook M1 Pro

  • Product : Mozilla Firefox 131.0.2 (release) and 133.0a1 (2024-10-11)

  • Important : Since this vulnerability is OS dependent, please test it on the M1 real machine using Apple's ARM silicon. (You may not be able to do this in a VM. The GPU configuration inside the VM is different from that of the real machine.)

Details

  • This vulnerability is a variant of 1914707 and is evidence that the vulnerability in 1914707 has not been fully patched.

  • Tested on 133.0a1 (2024-10-11) with patch 1914707 applied.

  • Other details are the same as 1914707.

  • Please do not dup this bug with other [#NIncomplete patch and variant vulnerabilities of 1914707], as this may result in other variants cases. Each case requires a review of the patch.

Proof-of-Concept

  • Open poc.html in the attached file with Mozilla Firefox. (Apple M1 Pro Real-Machine)
  • Now, if the Browser Process is corrupted, it is capable of sandbox escape.

Deadline

This bug is subject to a 90-day disclosure deadline. If a fix for this
issue is made available to users before the end of the 90-day deadline,
this bug report will become public 30 days after the fix was made
available. Otherwise, this bug report will become public at the deadline.
The scheduled deadline is "2025-01-10"

Actual results:

.

Expected results:

.

Group: firefox-core-security → gfx-core-security
Component: Untriaged → Graphics: CanvasWebGL
Product: Firefox → Core
Depends on: 1914707
Keywords: csectype-bounds
Whiteboard: [Disclosure deadline 2025-01-10]

These variant bugs should all be fixed in one patch

Depends on: CVE-2024-11691
OS: Unspecified → macOS
Hardware: Unspecified → ARM64
No longer depends on: CVE-2024-11691

The bug has a release status flag that shows some version of Firefox is affected, thus it will be considered confirmed.

Status: UNCONFIRMED → NEW
Ever confirmed: true

The bug is marked as tracked for firefox133 (nightly). However, the bug still isn't assigned.

:bhood, could you please find an assignee for this tracked bug? If you disagree with the tracking decision, please talk with the release managers.

For more information, please visit BugBot documentation.

Flags: needinfo?(bhood)
Severity: -- → S3
Flags: sec-bounty?

This is a reminder regarding comment #3!

The bug is marked as tracked for firefox133 (beta). We have limited time to fix this, the soft freeze is in 14 days. However, the bug still isn't assigned.

Fixed by patch for 1924184.

Status: NEW → RESOLVED
Closed: 6 months ago
Duplicate of bug: CVE-2024-11691
Resolution: --- → DUPLICATE
No longer blocks: CVE-2024-11691
Flags: sec-bounty? → sec-bounty-
Group: gfx-core-security → core-security-release
Flags: needinfo?(bhood)
Group: core-security-release
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: