説明
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Security UI vulnerability in select option of fullscreen notification dialog can be exploited to spoof user interface.
- Out of bounds memory access vulnerability in graphics shared memory handling can be exploited to cause denial of service.
- Type confusion vulnerability in WebAssembly can be exploited to execute arbitrary code.
- Use after free vulnerability in incomplete WebAssembly exception handing can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in editor component can be exploited to cause denial of service.
- Security vulnerability in web extension with StreamFilter can be exploited to obtain sensitive information, cause denial of service or execute arbitrary code.
- Uninitialized memory vulnerability in ANGLE used by WebGL can be exploited to obtain sensitive information.
- Use after free vulnerability in JavaScript garbage collection can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in IndexedDB can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in the date picker can be exploited to spoof user interface and bypass security restrictions.
オリジナルアドバイザリー
関連製品
CVEリスト
- CVE-2024-7529 unknown
- CVE-2024-7518 unknown
- CVE-2024-7519 unknown
- CVE-2024-7521 unknown
- CVE-2024-7525 unknown
- CVE-2024-7528 unknown
- CVE-2024-7522 unknown
- CVE-2024-7520 unknown
- CVE-2024-7526 unknown
- CVE-2024-7527 unknown
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!