Firefox v147.0.3 Released With Fix for Heap Buffer Overflow Vulnerability

Firefox v147.0.3 Released With Fix for Heap Buffer Overflow Vulnerability
Firefox v147.0.3 Released With Fix for Heap Buffer Overflow Vulnerability
Mozilla has released Firefox version 147.0.3, addressing a critical memory-related flaw that could allow attackers to execute arbitrary code by exploiting a heap buffer overflow issue in the browser’s media processing library.

The fix, part of the Mozilla Foundation Security Advisory 2026-10, improves overall browser security across both desktop and Extended Support Release (ESR) versions.

The vulnerability, tracked as CVE-2026-2447, was discovered in libvpx, a video codec library used by Firefox for handling VP8 and VP9 media streams.

Heap Buffer Overflow Fix Included

Reported by security researcher Jayjayjazz, the flaw could be triggered when a user visits a malicious website containing specially crafted video content.

If successfully exploited, the vulnerability could lead to memory corruption and potential remote code execution, giving attackers control over the user’s system.

The advisory considers the impact to be high, as this type of memory overflow vulnerability enables attackers to manipulate memory boundaries and inject malicious data into affected processes.

Mozilla’s engineers have resolved the issue by strengthening memory checks and enforcing secure handling of video frame buffers within libvpx.

The patch is included in Firefox 147.0.4, Firefox ESR 140.7.1, and Firefox ESR 115.32.1, released on February 16, 2026.

Users of earlier versions are strongly encouraged to update immediately to safeguard their browsers from potential exploitation.

The vulnerability fix highlights Mozilla’s ongoing commitment to user safety through rapid vulnerability response and transparent disclosure.

Mozilla also referenced Bug 2014390 in its security advisory, which provides additional technical details and a proof of concept demonstrating the issue’s reproducibility and the patch’s validation.

Routine browser updates remain critical for minimizing exposure to zero-day and memory-corruption vulnerabilities, particularly for applications that process complex data formats such as multimedia content.

Users and system administrators should ensure automatic updates are enabled to receive future security patches promptly.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Firefox v147.0.3 Released With Fix for Heap Buffer Overflow Vulnerability appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading