Kaspersky ID:
KLA74631
Detect Date:
10/29/2024
Updated:
10/31/2024

Description

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, cause denial of service, perform cross-site scripting attack, gain privileges, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability sing a data: URL within an iframe can be exploited to spoof user interface.
  2. Security vulnerability can be exploited to bypass security restrictions.
  3. Security UI vulnerability in cursor can be exploited to spoof user interface.
  4. Denial of service vulnerability can be exploited remotely to cause denial of service.
  5. Cross-site scripting (XSS) vulnerability in multipart/x-mixed-replace response can be exploited to perform cross-site scripting attack.
  6. Security vulnerability in composition area can be exploited to bypass security restrictions.
  7. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  8. Memory safety vulnerability can be exploited to execute arbitrary code.
  9. Use after free vulnerability in layout with accessibility can be exploited to cause denial of service or execute arbitrary code.

Original advisories

Related products

CVE list

  • CVE-2024-10460
    warning
  • CVE-2024-10463
    warning
  • CVE-2024-10465
    warning
  • CVE-2024-10466
    warning
  • CVE-2024-10461
    warning
  • CVE-2024-10462
    warning
  • CVE-2024-10458
    warning
  • CVE-2024-10467
    warning
  • CVE-2024-10464
    warning
  • CVE-2024-10459
    warning

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.