Kaspersky ID:
KLA11613
Data de detecção:
11/09/2019
Atualizado:
01/28/2026

Descrição

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Incorrect temporary files access configuration of Mozilla updater service can be exploited locally to bypass security restrictions;
  2. Use-after-free vulnerability in DocShell can be exploited remotely via specially designed website to cause denial of service;
  3. Use-after-free vulnerability in worker destruction can be exploited remotely via specially designed website to cause denial of service;
  4.  
  5. Stack corruption due to incorrect number of arguments in WebRTC code can be exploited remotely via specially designed website to cause denial of service;
  6. Race condition vulnerability in Resist Fingerprinting can be exploited remotely via specially designed website to cause denial of service;
  7. Out of bounds write vulnerability in NSS can be exploited remotely via specially designed website to cause denial of service;
  8. Buffer overflow vulnerability in plain Firefox text serializer can be exploited remotely via specially designed website to cause denial of service;

Comunicados originais

Exploração

Public exploits exist for this vulnerability.

Produtos relacionados

Lista de CVE

  • CVE-2019-17012
    critical
  • CVE-2019-17010
    critical
  • CVE-2019-13722
    high
  • CVE-2019-17009
    critical
  • CVE-2019-17011
    critical
  • CVE-2019-17005
    critical
  • CVE-2019-17008
    critical
  • CVE-2019-11745
    critical

Saiba mais

Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com

Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!
Kaspersky Next:
cibersegurança redefinida
Saber mais
Novo Kaspersky!
Sua vida dgital merece proteção completa!
Saber mais
Do you want to save your changes?
Your message has been sent successfully.