KLA11779
Multiple vulnerabilities in Mozilla Thunderbird

Обновлено: 03/06/2020
Дата обнаружения
05/05/2020
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Security bypass vulnerability in ‘Copy as cURL’ component can be exploited to bypass security restrictions and obtain sensitive information.
  2. Security bypass vulnerability in ‘Copy as cURL’ component on Windows can be exploited to bypass security restrictions and execute arbitrary code.
  3. Memory corruption vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability in Web Worker can be exploited to potentially cause denial of service.
  5. A spoofing vulnerability can be exploited remotely to spoof user interface.
  6. Stack buffer overflow vulnerability in SCTP component can be exploited to potentially cause denial of service.
Пораженные продукты

Mozilla Thunderbird earlier then 68.8

Решение

Update to the latest version
Download Thunderbird

Первичный источник обнаружения
MFSA2020-18
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Связанные продукты
Mozilla Thunderbird
CVE-IDS
CVE-2020-68317.5Critical
CVE-2020-123876.8High
CVE-2020-123934.6Warning
CVE-2020-123922.1Warning
CVE-2020-1239510.0Critical
CVE-2020-123974.3Warning
Узнай статистику распространения уязвимостей в твоем регионе