Kaspersky ID:
KLA48840
Дата обнаружения:
11/04/2023
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in Fullscreen notification can be exploited to spoof user interface.
  2. Out of bounds vulnerability in WebGL on macOS can be exploited to cause denial of service.
  3. Remote code execution vulnerability in Maintenance Service can be exploited remotely to execute arbitrary code.
  4. Memory corruption vulnerability in Garbage Collection compaction can be exploited remotely to cause denial of service or execute arbitrary code.
  5. Invalid free pointer in the memory manager can be remotely exploited to cause a denial of service or the execution of arbitrary code.
  6. Information disclosure vulnerability in Save As dialog on Windows can be exploited to obtain sensitive information.
  7. Security vulnerability in the ARM64 Ion compiler can be exploited to bypass security restrictions.
  8. Security vulnerability can be exploited to bypass security restrictions.
  9. Remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  10. Memory safety vulnerability can be exploited to execute arbitrary code.
  11. Information disclosure vulnerability in can be exploited to obtain sensitive information.
  12. Denial of service vulnerability in Ribose RNP library can be exploited to cause denial of service.
  13. Memory corruption vulnerability in Safe Browsing can be exploited remotely to cause denial of service or execute arbitrary code.
  14. Double-free memory address vulnerability in libwebp can be exploited remotely to cause denial of service or execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2023-29533
    warning
  • CVE-2023-29531
    critical
  • CVE-2023-29532
    high
  • CVE-2023-29535
    high
  • CVE-2023-29536
    critical
  • CVE-2023-29545
    high
  • CVE-2023-29548
    high
  • CVE-2023-29541
    critical
  • CVE-2023-29542
    critical
  • CVE-2023-29539
    critical
  • CVE-2023-29550
    critical
  • CVE-2023-0547
    high
  • CVE-2023-29479
    high
  • CVE-2023-1945
    high
  • CVE-2023-1999
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.