Searching
..

Click anywhere to stop

KLA12148
Multiple vulnerabilities in Mozilla Thunderbird

Updated: 01/25/2024
Detect date
?
04/19/2021
Severity
?
High
Description

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, obtain sensitive information, execute arbitrary code, spoof user interface, gain privileges.

Below is a complete list of vulnerabilities:

  1. Memory corruption and vulnerability can be exploited to cause denial of service;
  2. A security vulnerability can be exploited to bypass security restrictions;
  3. A race condition vulnerability can be exploited via special crafted object to cause denial of service or obtain sensitive information;
  4. A integer overflow vulnerability can be exploited to security bypass restrictions;
  5. A Null read vulnerability related to WebAssembly JIT can be exploited to cause denial of service;
  6. A vulnerability related to FTP URL can be exploited to execute arbitrary code;
  7. A vulnerability related to secure lock icon can be exploited to spoof user interface;
  8. A memory safety vulnerability related to Responsive Design Mode can be exploited to execute arbitrary code;
  9. Elevation of privilege vulnerability related to Blob URL can be exploited to gain privileges;
Affected products

Mozilla Thunderbird earlier than 78.10

Solution

Update to the latest version
Download Thunderbird

Original advisories

MFSA2021-14

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Related products
Mozilla Thunderbird
CVE-IDS
?
CVE-2021-239617.4High
CVE-2021-239948.8Critical
CVE-2021-299482.5Warning
CVE-2021-299468.8Critical
CVE-2021-299456.5High
CVE-2021-240028.8Critical
CVE-2021-239986.5High
CVE-2021-239958.8Critical
CVE-2021-239998.8Critical
Find out the statistics of the vulnerabilities spreading in your region