Description

Mozilla has released Firefox 142 to fix multiple critical security issues that could allow attackers to run malicious code remotely on vulnerable systems. These vulnerabilities, if exploited, could allow attackers to run arbitrary code on targeted machines without user interaction. Detailed in the Mozilla Foundation Security Advisory 2025-64 on August 19, 2025, the update resolves nine separate security issues, ranging from memory safety concerns to spoofing and denial-of-service threats. Three major vulnerabilities are linked to memory safety issues impacting different versions of both Firefox and Thunderbird. Security researchers have shown how these vulnerabilities could result in memory corruption, potentially allowing attackers to compromise the affected systems. CVE-2025-9187 addresses security vulnerabilities that were specifically fixed in Firefox 142 and Thunderbird 142, CVE-2025-9184 impacts a wider range of versions, including Firefox ESR 140.2 and Thunderbird ESR 140.2. This vulnerability reflects the persistent and widespread nature of memory corruption risks across Mozilla's platforms. Another critical issue, CVE-2025-9179, discovered by a researcher named Oskar, enables attackers to bypass sandbox restrictions in the Audio/Video GMP component, creating a pathway for privilege escalation through corrupted encrypted media handling. Additional threats include CVE-2025-9180, uncovered by Tom Van Goethem, which allows attackers to circumvent the same-origin policy via the Canvas2D graphics component, potentially granting unauthorized access to data from different domains. To counter these significant security risks, both individuals and organizations are strongly urged to upgrade to Firefox 142 immediately. Delaying this update may leave systems exposed to threats that exploit the combined power of sandbox escapes and memory vulnerabilities—especially via malicious websites or crafted content.