Kaspersky ID:
KLA11913
Дата обнаружения:
16/07/2020
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, obtain sensitive information, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. URI vulnerability in WebRTC can be exploited to perform domain spoofing and bypass security restrictions.
  2. RSA key generation vulnerability can be exploited to bypass security restrictions and obtain sensitive information.
  3. SB vulnerability in AppCache can be exploited to bypass security restrictions.
  4. DLL Hijacking vulnerability in webauthn.dll on Windows can be exploited to execute arbitrary code.
  5. Use after free vulnerability in WebRTC VideoBroadcaster can be exploited to potentially cause denial of service.
  6. Out of bounds read vulnerability Date.parse() component can be exploited to potentially obtain sensitive information.
  7. A security bypass vulnerability in X-Frame-Options can be exploited to security bypass restrictions.
  8. Memory vulnerability in Firefox can be exploited to execute arbitrary code.
  9. Integer overflow vulnerability in nsJPEGEncoder::emptyOutputBuffer component can be exploited to potentially cause denial of service.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2020-12424
    high
  • CVE-2020-12425
    high
  • CVE-2020-12416
    critical
  • CVE-2020-12426
    critical
  • CVE-2020-12422
    critical
  • CVE-2020-12423
    critical
  • CVE-2020-12415
    high
  • CVE-2020-12402
    warning
  • CVE-2020-15648
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.