説明
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Out of bounds memory access vulnerability in WebGL2 blitFramebuffer can be exploited to cause denial of service.
- Information disclosure vulnerability for X11 can be exploited to obtain sensitive information.
- Security feature bypass vulnerability can be exploited remotely to bypass security restrictions.
- Use after free vulnerability in ReadableByteStreamQueueEntry::Buffer can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in MessagePort::Entangled can be exploited to cause denial of service or execute arbitrary code.
- Clickjacking permission prompts vulnerability in fullscreen transition can be exploited remotely to spoof user interface.
オリジナルアドバイザリー
関連製品
CVEリスト
- CVE-2023-6212 critical
- CVE-2023-6204 high
- CVE-2023-6208 critical
- CVE-2023-6209 high
- CVE-2023-6207 critical
- CVE-2023-6205 high
- CVE-2023-6206 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!