Kaspersky ID:
KLA73182
Detect Date:
09/03/2024
Updated:
01/28/2026

Description

Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, cause denial of service, perform cross-site scripting attack, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Memory safety vulnerability can be exploited to execute arbitrary code.
  2. Type confusion vulnerability when looking up a property name in a “with” block can be exploited to cause denial of service.
  3. Type confusion vulnerability in WASM can be exploited to cause denial of service.
  4. Security vulnerability can be exploited to bypass security restrictions.
  5. Security UI vulnerability can be exploited to spoof user interface.
  6. Cross-site scripting (XSS) vulnerability can be exploited to perform cross-site scripting attack.
  7. Use after free vulnerability when aborting the verification of an OTR chat session can be exploited to cause denial of service or execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2024-8387
    critical
  • CVE-2024-8381
    critical
  • CVE-2024-8385
    critical
  • CVE-2024-8386
    high
  • CVE-2024-8382
    critical
  • CVE-2024-8384
    critical
  • CVE-2024-8394
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.