{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-9179","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2025-08-19T15:55:37.418Z","datePublished":"2025-08-19T20:33:53.949Z","dateUpdated":"2026-04-13T14:25:47.601Z"},"containers":{"cna":{"affected":[{"product":"Firefox","vendor":"Mozilla","versions":[{"status":"unaffected","version":"115.27","lessThanOrEqual":"115.*","versionType":"rpm"},{"status":"unaffected","version":"128.14","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"140.2","lessThanOrEqual":"140.*","versionType":"rpm"},{"status":"unaffected","version":"142","lessThanOrEqual":"*","versionType":"rpm"}]},{"product":"Thunderbird","vendor":"Mozilla","versions":[{"status":"unaffected","version":"128.14","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"140.2","lessThanOrEqual":"140.*","versionType":"rpm"},{"status":"unaffected","version":"142","lessThanOrEqual":"*","versionType":"rpm"}]}],"descriptions":[{"lang":"en","value":"An attacker was able to perform memory corruption in the GMP process which processes encrypted media. This process is also heavily sandboxed, but represents slightly different privileges from the content process. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.","supportingMedia":[{"type":"text/html","base64":false,"value":"An attacker was able to perform memory corruption in the GMP process which processes encrypted media. This process is also heavily sandboxed, but represents slightly different privileges from the content process. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2."}]}],"title":"Sandbox escape due to invalid pointer in the Audio/Video: GMP component","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1979527"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-64/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-65/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-66/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-67/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-70/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-71/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-72/"}],"credits":[{"lang":"en","value":"Oskar"}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2026-04-13T14:25:47.601Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-08-20T14:06:11.940109Z","id":"CVE-2025-9179","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-20T15:18:57.429Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00018.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00016.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T18:14:10.275Z"}}]}}