CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
99.3%
The WYSIWYG rendering engine (“rich mail” editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | thunderbird | * | cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.1 | cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.2 | cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.3 | cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.4 | cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.5 | cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.6 | cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.7 | cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.7.1 | cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:* |
mozilla | thunderbird | 0.7.2 | cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:* |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc
lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html
secunia.com/advisories/19721
secunia.com/advisories/19811
secunia.com/advisories/19821
secunia.com/advisories/19823
secunia.com/advisories/19863
secunia.com/advisories/19902
secunia.com/advisories/19941
secunia.com/advisories/19950
secunia.com/advisories/20051
secunia.com/advisories/21033
secunia.com/advisories/21622
secunia.com/advisories/22065
securitytracker.com/id?1015665
sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
support.avaya.com/elmodocs2/security/ASA-2006-205.htm
www.debian.org/security/2006/dsa-1046
www.debian.org/security/2006/dsa-1051
www.gentoo.org/security/en/glsa/glsa-200604-18.xml
www.gentoo.org/security/en/glsa/glsa-200605-09.xml
www.mandriva.com/security/advisories?name=MDKSA-2006:052
www.mandriva.com/security/advisories?name=MDKSA-2006:076
www.mandriva.com/security/advisories?name=MDKSA-2006:078
www.mozilla.org/security/announce/2006/mfsa2006-21.html
www.novell.com/linux/security/advisories/2006_04_25.html
www.osvdb.org/23653
www.redhat.com/support/errata/RHSA-2006-0329.html
www.redhat.com/support/errata/RHSA-2006-0330.html
www.securityfocus.com/archive/1/425786/100/0/threaded
www.securityfocus.com/archive/1/436296/100/0/threaded
www.securityfocus.com/archive/1/438730/100/0/threaded
www.securityfocus.com/archive/1/446657/100/200/threaded
www.securityfocus.com/bid/16770
www.vupen.com/english/advisories/2006/3749
exchange.xforce.ibmcloud.com/vulnerabilities/25983
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10782
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2024
usn.ubuntu.com/276-1/