Beschreibung
Multiple serious vulnerabilities have been found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause a denial of service, obtain sensitive information and execute arbitrary code.
Below is a complete list of vulnerabilities
- Errors in the handling of node adoption can be exploited for manipulating DOM events and removing audio elements;
- An improper event handling on marquee elements can be exploited remotely to bypass security restrictions (Content Security Policy) and allow inline JavaScript;
- Memory corruption at libGLES can be exploited remotely to cause a denial of service;
- Use-after-free vulnerability can be exploited remotely to cause a denial of service when manipulating DOM subtrees in the Editor;
- Errors in the handling of loading by SVG images can be exploited remotely to bypass security restrictions via using of data: URLs;
- Cross-origin information leak in shared atoms can be exploited remotely to obtain sensitive information(for example, usernames embedded in JavaScript code);
- A crash in EnumerateSubDocuments can be exploited remotely via adding or removing sub-documents to cause a denial of service;
- Memory corruption vulnerabilities can be exploited remotely to execute arbitrary code.
NB: This vulnerability have no public CVSS rating so rating can be changed by the time.
NB: At this moment Mozilla just reserved CVE numbers for this vulnerabilities. Information can be changed soon.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2016-9899 critical
- CVE-2016-9895 critical
- CVE-2016-9897 critical
- CVE-2016-9898 critical
- CVE-2016-9900 critical
- CVE-2016-9904 critical
- CVE-2016-9905 critical
- CVE-2016-9893 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!