Searching
..

Click anywhere to stop

KLA12376
Multiple vulnerabilities in Mozilla Thunderbird

Updated: 01/25/2024
Detect date
?
12/07/2021
Severity
?
High
Description

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, obtain sensitive information, cause denial of service, bypass security restrictions, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability can be exploited to spoof user interface.
  2. Information disclosure vulnerability in XMLHttpRequest can be exploited to obtain sensitive information.
  3. Denial of service vulnerability in Location API can be exploited to cause denial of service.
  4. Information disclosure vulnerability in asynchronous function can be exploited to obtain sensitive information.
  5. Security bypass vulnerability in CSP sandbox directive can be exploited to bypass security restrictions.
  6. Heap buffer overflow vulnerability in structured clone can be exploited to cause denial of service.
  7. Use after free vulnerability in GC can be exploited to cause denial of service.
  8. Security UI vulnerability in full screen and pointer lock can be exploited to spoof user interface.
  9. Security UI vulnerability in cursor can be exploited to spoof user interface.
  10. Security vulnerability in composition area can be exploited to bypass security restrictions.
  11. Memory safety vulnerability can be exploited to execute arbitrary code.
Affected products

Mozilla Thunderbird earlier than 91.4.0

Solution

Update to the latest version
Download Thunderbird

Original advisories

MFSA2021-54

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Related products
Mozilla Thunderbird
CVE-IDS
?
Find out the statistics of the vulnerabilities spreading in your region