Description
Multiple serious vulnerabilities have been found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause a denial of service, obtain sensitive information and execute arbitrary code.
Below is a complete list of vulnerabilities
- Errors in the handling of node adoption can be exploited for manipulating DOM events and removing audio elements;
- An improper event handling on marquee elements can be exploited remotely to bypass security restrictions (Content Security Policy) and allow inline JavaScript;
- Memory corruption at libGLES can be exploited remotely to cause a denial of service;
- Use-after-free vulnerability can be exploited remotely to cause a denial of service when manipulating DOM subtrees in the Editor;
- Errors in the handling of loading by SVG images can be exploited remotely to bypass security restrictions via using of data: URLs;
- Cross-origin information leak in shared atoms can be exploited remotely to obtain sensitive information(for example, usernames embedded in JavaScript code);
- A crash in EnumerateSubDocuments can be exploited remotely via adding or removing sub-documents to cause a denial of service;
- Memory corruption vulnerabilities can be exploited remotely to execute arbitrary code.
NB: This vulnerability have no public CVSS rating so rating can be changed by the time.
NB: At this moment Mozilla just reserved CVE numbers for this vulnerabilities. Information can be changed soon.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2016-9899 critical
- CVE-2016-9895 warning
- CVE-2016-9897 warning
- CVE-2016-9898 critical
- CVE-2016-9900 warning
- CVE-2016-9904 warning
- CVE-2016-9905 high
- CVE-2016-9893 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!