Kaspersky ID:
KLA65693
Дата обнаружения:
16/04/2024
Обновлено:
24/04/2024

Описание

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, cause denial of service, spoof user interface, obtain sensitive information, perform cross-site scripting attack.

Below is a complete list of vulnerabilities:

  1. Security vulnerability can be exploited to bypass security restrictions.
  2. Use after free vulnerability can be exploited to cause denial of service or execute arbitrary code.
  3. Memory safety vulnerability can be exploited to execute arbitrary code.
  4. Integer overflow vulnerability in OpenType sanitizer can be exploited to cause denial of service.
  5. Information disclosure vulnerability in GetBoundName can be exploited to obtain sensitive information.
  6. Clickjacking permission prompts vulnerability can be exploited remotely to spoof user interface.
  7. Denial of service vulnerability in HTTP/2 can be exploited remotely to cause denial of service.
  8. Out of bounds memory read can be exploited to cause denial of service.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2024-2609
    warning
  • CVE-2024-3302
    warning
  • CVE-2024-3859
    warning
  • CVE-2024-3864
    warning
  • CVE-2024-3861
    warning
  • CVE-2024-3857
    warning
  • CVE-2024-3854
    warning
  • CVE-2024-3852
    warning
  • CVE-2024-3863
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.