KLA11779
Multiple vulnerabilities in Mozilla Thunderbird

Updated: 06/03/2020
Detect date
?
05/05/2020
Severity
?
Critical
Description

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Security bypass vulnerability in ‘Copy as cURL’ component can be exploited to bypass security restrictions and obtain sensitive information.
  2. Security bypass vulnerability in ‘Copy as cURL’ component on Windows can be exploited to bypass security restrictions and execute arbitrary code.
  3. Memory corruption vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability in Web Worker can be exploited to potentially cause denial of service.
  5. A spoofing vulnerability can be exploited remotely to spoof user interface.
  6. Stack buffer overflow vulnerability in SCTP component can be exploited to potentially cause denial of service.
Affected products

Mozilla Thunderbird earlier then 68.8

Solution

Update to the latest version
Download Thunderbird

Original advisories

MFSA2020-18

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Related products
Mozilla Thunderbird
CVE-IDS
?
CVE-2020-68317.5Critical
CVE-2020-123876.8High
CVE-2020-123934.6Warning
CVE-2020-123922.1Warning
CVE-2020-123974.3Warning
Find out the statistics of the vulnerabilities spreading in your region