Kaspersky ID:
KLA11921
検出日:
07/28/2020
更新日:
01/28/2026

説明

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Overriding file type vulnerability can be exploited to bypass security restrictions and obtain sensitive information.
  2. Security vulnerability can be exploited to bypass security restrictions.
  3. Security vulnerability can be exploited to obtain sensitive information and bypass security restrictions.
  4. Memory safety vulnerability can be exploited to execute arbitrary code.
  5. Type confusion vulnerability can be exploited to cause denial of service.
  6. Security vulnerability can be exploited to bypass same origin policy.
  7. Implementation vulnerability in WebRTC can be exploited to potentially denial of service.
  8. DLL hijacking vulnerability on Windows can be exploited to bypass security restrictions.
  9. Security UI vulnerabiloty in CSS can be exploited to spoof user interface.
  10. Use after free vulnerability in ANGLE component can be exploited to potentially cause denial of service.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

関連製品

CVEリスト

  • CVE-2020-6463
    critical
  • CVE-2020-6514
    high
  • CVE-2020-15658
    high
  • CVE-2020-15653
    high
  • CVE-2020-15652
    high
  • CVE-2020-15655
    high
  • CVE-2020-15656
    critical
  • CVE-2020-15659
    critical
  • CVE-2020-15657
    critical
  • CVE-2020-15654
    high

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.