Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, obtain sensitive information, cause denial of service, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Security UI vulnerability can be exploited to spoof user interface.
- Information disclosure vulnerability in XMLHttpRequest can be exploited to obtain sensitive information.
- Denial of service vulnerability in Location API can be exploited to cause denial of service.
- Information disclosure vulnerability in asynchronous function can be exploited to obtain sensitive information.
- Security bypass vulnerability in CSP sandbox directive can be exploited to bypass security restrictions.
- Heap buffer overflow vulnerability in structured clone can be exploited to cause denial of service.
- Use after free vulnerability in GC can be exploited to cause denial of service.
- Security UI vulnerability in full screen and pointer lock can be exploited to spoof user interface.
- Security UI vulnerability in cursor can be exploited to spoof user interface.
- Security vulnerability in composition area can be exploited to bypass security restrictions.
- Memory safety vulnerability can be exploited to execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2021-43541 high
- CVE-2021-43542 high
- CVE-2021-43545 high
- CVE-2021-43536 high
- CVE-2021-43543 high
- CVE-2021-43537 critical
- CVE-2021-43539 critical
- CVE-2021-43538 warning
- CVE-2021-43546 warning
- CVE-2021-43528 high
- CVE-2021-4129 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!