KLA11613
Multiple vulnerabilities in Mozilla Thunderbird

Updated: 06/03/2020
Detect date
?
11/09/2019
Severity
?
High
Description

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Incorrect temporary files access configuration of Mozilla updater service can be exploited locally to bypass security restrictions;
  2. Use-after-free vulnerability in DocShell can be exploited remotely via specially designed website to cause denial of service;
  3. Use-after-free vulnerability in worker destruction can be exploited remotely via specially designed website to cause denial of service;
  4.  
  5. Stack corruption due to incorrect number of arguments in WebRTC code can be exploited remotely via specially designed website to cause denial of service;
  6. Race condition vulnerability in Resist Fingerprinting can be exploited remotely via specially designed website to cause denial of service;
  7. Out of bounds write vulnerability in NSS can be exploited remotely via specially designed website to cause denial of service;
  8. Buffer overflow vulnerability in plain Firefox text serializer can be exploited remotely via specially designed website to cause denial of service;
Affected products

Mozilla Thunderbird earlier than 68.3

Solution

Update to the latest version
Download Mozilla Thunderbird

Original advisories

mfsa2019-38

Impacts
?
ACE 
[?]

DoS 
[?]

SB 
[?]
Related products
Mozilla Thunderbird
CVE-IDS
?
Find out the statistics of the vulnerabilities spreading in your region