Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, bypass security restrictions, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Information disclosure vulnerability in Cloud Clipboard for Windows can be exploited to obtain sensitive information.
- Security UI vulnerability can be exploited to spoof user interface or obtain sensitive information.
- Security vulnerability in iframe sandbox rules can be exploited to bypass security restrictions.
- Code execution vulnerability for MacOS can be exploited via special .inetloc files to execute arbitrary code.
- Use after free vulnerability in file picker dialog can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass security restrictions and spoof user interface.
- Security bypass vulnerability in HTTP2 can be exploited to bypass security restrictions.
- Security UI vulnerability in Javascript alert box can be exploited to spoof user interface.
- Use after free vulnerability in HTTP2 Session object can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Memory corruption vulnerability in S/MIME messages can be exploited remotely to execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2021-38505 high
- CVE-2021-38506 warning
- CVE-2021-38503 critical
- CVE-2021-38510 critical
- CVE-2021-38504 critical
- CVE-2021-38508 warning
- CVE-2021-38507 high
- CVE-2021-38509 warning
- CVE-2021-43535 critical
- CVE-2021-43534 critical
- CVE-2021-43529 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!