Описание
Multiple serious vulnerabilities have been found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause a denial of service, obtain sensitive information and execute arbitrary code.
Below is a complete list of vulnerabilities
- Errors in the handling of node adoption can be exploited for manipulating DOM events and removing audio elements;
- An improper event handling on marquee elements can be exploited remotely to bypass security restrictions (Content Security Policy) and allow inline JavaScript;
- Memory corruption at libGLES can be exploited remotely to cause a denial of service;
- Use-after-free vulnerability can be exploited remotely to cause a denial of service when manipulating DOM subtrees in the Editor;
- Errors in the handling of loading by SVG images can be exploited remotely to bypass security restrictions via using of data: URLs;
- Cross-origin information leak in shared atoms can be exploited remotely to obtain sensitive information(for example, usernames embedded in JavaScript code);
- A crash in EnumerateSubDocuments can be exploited remotely via adding or removing sub-documents to cause a denial of service;
- Memory corruption vulnerabilities can be exploited remotely to execute arbitrary code.
NB: This vulnerability have no public CVSS rating so rating can be changed by the time.
NB: At this moment Mozilla just reserved CVE numbers for this vulnerabilities. Information can be changed soon.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2016-9899 critical
- CVE-2016-9895 warning
- CVE-2016-9897 warning
- CVE-2016-9898 critical
- CVE-2016-9900 warning
- CVE-2016-9904 warning
- CVE-2016-9905 high
- CVE-2016-9893 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!