Lucene search

K
mozillaMozilla FoundationMFSA2023-27
HistoryJul 20, 2023 - 12:00 a.m.

Security Vulnerabilities fixed in Thunderbird 115.0.1 — Mozilla

2023-07-2000:00:00
Mozilla Foundation
www.mozilla.org
40
thunderbird
worker lifecycle
potentially exploitable crash
filenames
document file
executable file
file extension

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

34.4%

During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash.
Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension.

Affected configurations

Vulners
Node
mozillathunderbirdRange<115.0.1
CPENameOperatorVersion
thunderbirdlt115.0.1

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

34.4%