Kaspersky ID:
KLA11779
Дата обнаружения:
05/05/2020
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Security bypass vulnerability in ‘Copy as cURL’ component can be exploited to bypass security restrictions and obtain sensitive information.
  2. Security bypass vulnerability in ‘Copy as cURL’ component on Windows can be exploited to bypass security restrictions and execute arbitrary code.
  3. Memory corruption vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability in Web Worker can be exploited to potentially cause denial of service.
  5. A spoofing vulnerability can be exploited remotely to spoof user interface.
  6. Stack buffer overflow vulnerability in SCTP component can be exploited to potentially cause denial of service.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2020-6831
    critical
  • CVE-2020-12387
    high
  • CVE-2020-12393
    warning
  • CVE-2020-12392
    warning
  • CVE-2020-12395
    critical
  • CVE-2020-12397
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.