Kaspersky ID:
KLA12148
Bulunma tarihi:
04/19/2021
Yüklendi:
01/28/2026

Açıklama

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, obtain sensitive information, execute arbitrary code, spoof user interface, gain privileges.

Below is a complete list of vulnerabilities:

  1. Memory corruption and vulnerability can be exploited to cause denial of service;
  2. A security vulnerability can be exploited to bypass security restrictions;
  3. A race condition vulnerability can be exploited via special crafted object to cause denial of service or obtain sensitive information;
  4. A integer overflow vulnerability can be exploited to security bypass restrictions;
  5. A Null read vulnerability related to WebAssembly JIT can be exploited to cause denial of service;
  6. A vulnerability related to FTP URL can be exploited to execute arbitrary code;
  7. A vulnerability related to secure lock icon can be exploited to spoof user interface;
  8. A memory safety vulnerability related to Responsive Design Mode can be exploited to execute arbitrary code;
  9. Elevation of privilege vulnerability related to Blob URL can be exploited to gain privileges;

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

İlgili ürünler

CVE Listesi

  • CVE-2021-23961
    high
  • CVE-2021-23994
    critical
  • CVE-2021-29948
    warning
  • CVE-2021-29946
    critical
  • CVE-2021-29945
    high
  • CVE-2021-24002
    critical
  • CVE-2021-23998
    high
  • CVE-2021-23995
    critical
  • CVE-2021-23999
    critical

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.