8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.006 Low
EPSS
Percentile
77.7%
AppCache manifest poisoning due to url encoded character processing (CVE-2020-12415). Use-after-free in WebRTC VideoBroadcaster (CVE-2020-12416). Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422). WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424). Out of bound read in Date.parse() (CVE-2020-12425). Memory safety bugs fixed in Thunderbird 78 (CVE-2020-12426). X-Frame-Options bypass using object or embed tags (CVE-2020-15648). Memory safety bugs fixed in Thunderbird 78.3 (CVE-2020-15673). XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676). Download origin spoofing via redirect (CVE-2020-15677). When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678). Note that Enigmail will no longer let you manage your PGP keys, but instead will only provide a migration tool. Thunderbird will no longer use the system keyring and GnuPG; instead, it will handle PGP keys internally. To use your existing PGP keys with Thunderbird 78 and above, you must use the migration tool from Enigmail upon the first Thunderbird run. See the migration notes on the Mageia wiki. Also note that, to protect your keys, you should define a master password in Thunderbird.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 7 | noarch | thunderbird | < 78.3.1-3 | thunderbird-78.3.1-3.mga7 |
Mageia | 7 | noarch | thunderbird-l10n | < 78.3.1-1 | thunderbird-l10n-78.3.1-1.mga7 |
bugs.mageia.org/show_bug.cgi?id=26965
wiki.mageia.org/en/Migration_from_Thunderbird_68_and_Enigmail_to_Thunderbird_78
www.mozilla.org/en-US/security/advisories/mfsa2020-29/
www.mozilla.org/en-US/security/advisories/mfsa2020-44/
www.thunderbird.net/en-US/thunderbird/78.0.1/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.0/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.1.0/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.1.1/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.2.0/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.2.1/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.2.2/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.3.0/releasenotes/
www.thunderbird.net/en-US/thunderbird/78.3.1/releasenotes/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.006 Low
EPSS
Percentile
77.7%