Kaspersky ID:
KLA52675
Erkennungsdatum:
08/29/2023
Aktualisiert:
03/28/2025

Beschreibung

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, spoof user interface, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Memory corruption vulnerability in IPC CanvasTranslator can be exploited remotely to cause denial of service or execute arbitrary code.
  2. Memory corruption vulnerability in IPC ColorPickerShownCallback can be exploited remotely to cause denial of service or execute arbitrary code.
  3. Memory corruption vulnerability in IPC FilePickerShownCallback can be exploited remotely to cause denial of service or execute arbitrary code.
  4. Integer overflow vulnerability in RecordedSourceSurfaceCreation can be exploited to cause execute arbitrary code and denial of service.
  5. Memory corruption vulnerability in JIT UpdateRegExpStatics can be exploited remotely to cause denial of service or execute arbitrary code.
  6. Security UI vulnerability in Full screen notification can be exploited to spoof user interface.
  7. Security vulnerability in CheckRegExpSyntax can be exploited to bypass security restrictions.
  8. Information disclosure vulnerability in Push Notifications can be exploited to obtain sensitive information.
  9. Code execution vulnerability can be exploited remotely to execute arbitrary code.
  10. Buffer overflow vulnerability in WebGL glGetProgramiv can be exploited to cause denial of service.
  11. Information disclosure vulnerability in HttpBaseChannel can be exploited to obtain sensitive information.
  12. Memory safety vulnerability can be exploited to execute arbitrary code.

Ursprüngliche Informationshinweise

Betroffene Produkte

CVE Liste

  • CVE-2023-4051
    critical
  • CVE-2023-4053
    high
  • CVE-2023-4581
    warning
  • CVE-2023-4577
    high
  • CVE-2023-4584
    critical
  • CVE-2023-4576
    critical
  • CVE-2023-4575
    high
  • CVE-2023-4582
    critical
  • CVE-2023-4583
    critical
  • CVE-2023-4573
    high
  • CVE-2023-4578
    high
  • CVE-2023-4574
    high
  • CVE-2023-4585
    critical
  • CVE-2023-4580
    high

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.