Kaspersky ID:
KLA20174
Erkennungsdatum:
01/18/2023
Aktualisiert:
03/28/2025

Beschreibung

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Security bypass vulnerability in libusrsctp can be exploited to bypass security restrictions.
  2. Code execution vulnerability in GTK drag and drop can be exploited remotely to execute arbitrary code.
  3. Code execution vulnerability in Devtools can be exploited remotely to execute arbitrary code.
  4. Security UI vulnerability in cross-origin iframe can be exploited to spoof user interface.
  5. Security vulnerability in WebWorker can be exploited to bypass security restrictions.
  6. Security UI vulnerability in Fullscreen notification can be exploited to spoof user interface.
  7. Security vulnerability in format directive can be exploited to bypass security restrictions.
  8. Memory safety vulnerability can be exploited to execute arbitrary code.

Ursprüngliche Informationshinweise

Betroffene Produkte

CVE Liste

  • CVE-2022-46877
    warning
  • CVE-2022-46871
    critical
  • CVE-2023-23602
    high
  • CVE-2023-23598
    high
  • CVE-2023-23599
    high
  • CVE-2023-23605
    critical
  • CVE-2023-23603
    high
  • CVE-2023-23601
    high

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.