Kaspersky ID:
KLA11779
検出日:
05/05/2020
更新日:
01/22/2024

説明

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Security bypass vulnerability in ‘Copy as cURL’ component can be exploited to bypass security restrictions and obtain sensitive information.
  2. Security bypass vulnerability in ‘Copy as cURL’ component on Windows can be exploited to bypass security restrictions and execute arbitrary code.
  3. Memory corruption vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability in Web Worker can be exploited to potentially cause denial of service.
  5. A spoofing vulnerability can be exploited remotely to spoof user interface.
  6. Stack buffer overflow vulnerability in SCTP component can be exploited to potentially cause denial of service.

オリジナルアドバイザリー

関連製品

CVEリスト

  • CVE-2020-6831
    critical
  • CVE-2020-12387
    high
  • CVE-2020-12393
    warning
  • CVE-2020-12392
    warning
  • CVE-2020-12395
    critical
  • CVE-2020-12397
    warning

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.