Searching
..

Click anywhere to stop

KLA12352
Multiple vulnerabilities in Mozilla Thunderbird

Обновлено: 22/01/2024
Дата обнаружения
03/11/2021
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, bypass security restrictions, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Information disclosure vulnerability in Cloud Clipboard for Windows can be exploited to obtain sensitive information.
  2. Security UI vulnerability can be exploited to spoof user interface or obtain sensitive information.
  3. Security vulnerability in iframe sandbox rules can be exploited to bypass security restrictions.
  4. Code execution vulnerability for MacOS can be exploited via special .inetloc files to execute arbitrary code.
  5. Use after free vulnerability in file picker dialog can be exploited to cause denial of service.
  6. Security vulnerability can be exploited to bypass security restrictions and spoof user interface.
  7. Security bypass vulnerability in HTTP2 can be exploited to bypass security restrictions.
  8. Security UI vulnerability in Javascript alert box can be exploited to spoof user interface.
  9. Use after free vulnerability in HTTP2 Session object can be exploited to cause denial of service.
  10. Memory safety vulnerability can be exploited to execute arbitrary code.
  11. Memory corruption vulnerability in S/MIME messages can be exploited remotely to execute arbitrary code.
Пораженные продукты

Mozilla Thunderbird earlier than 91.3

Решение

Update to the latest version
Download Thunderbird

Первичный источник обнаружения
MFSA2021-51
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Связанные продукты
Mozilla Thunderbird
CVE-IDS
Узнай статистику распространения уязвимостей в твоем регионе