Kaspersky ID:
KLA65226
Detect Date:
03/19/2024
Updated:
03/20/2024

Description

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, obtain sensitive information, bypass security restrictions, gain privileges.

Below is a complete list of vulnerabilities:

  1. Out of memory conditions vulnerability in ICU can be exploited to cause denial of service.
  2. Use after free vulnerability in SafeRefPtr can be exploited to cause denial of service or execute arbitrary code.
  3. Remote code execution vulnerability in Windows Error Reporter can be exploited remotely to execute arbitrary code.
  4. Information disclosure vulnerability in NSS can be exploited to obtain sensitive information.
  5. Integer overflow vulnerability can be exploited to cause denial of service.
  6. Remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  7. Memory safety vulnerability can be exploited to execute arbitrary code.
  8. Denial of service vulnerability in NSS TLS method can be exploited to cause denial of service.
  9. Clickjacking permission prompts vulnerability can be exploited remotely to gain privileges.
  10. Security vulnerability in composition area can be exploited to bypass security restrictions.

Original advisories

Related products

CVE list

  • CVE-2024-0743
    critical
  • CVE-2023-5388
    warning
  • CVE-2024-2612
    warning
  • CVE-2024-2605
    warning
  • CVE-2024-2608
    warning
  • CVE-2024-2607
    warning
  • CVE-2024-2614
    warning
  • CVE-2024-2611
    warning
  • CVE-2024-2610
    warning
  • CVE-2024-2616
    warning

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.