9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.5 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
74.8%
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
bypass security restrictions, obtain sensitive information, cause
undefined behaviour, spoof the browser UI, or execute arbitrary code.
(CVE-2022-22759, CVE-2022-22760, CVE-2022-22761, CVE-2022-22763,
CVE-2022-22764, CVE-2022-26381, CVE-2022-26383, CVE-2022-26384)
It was discovered that extensions of a particular type could auto-update
themselves and bypass the prompt that requests permissions. If a user
were tricked into installing a specially crafted extension, an attacker
could potentially exploit this to bypass security restrictions.
(CVE-2022-22754)
It was discovered that dragging and dropping an image into a folder could
result in it being marked as executable. If a user were tricked into
dragging and dropping a specially crafted image, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2022-22756)
It was discovered that files downloaded to /tmp were accessible to other
users. A local attacker could exploit this to obtain sensitive
information. (CVE-2022-26386)
A TOCTOU bug was discovered when verifying addon signatures during
install. A local attacker could potentially exploit this to trick a
user into installing an addon with an invalid signature.
(CVE-2022-26387)
An out-of-bounds write by one byte was discovered when processing
messages in some circumstances. If a user were tricked into opening a
specially crafted message, an attacker could potentially exploit this
to cause a denial of service. (CVE-2022-0566)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.10 | noarch | thunderbird | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-dbg | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-dev | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-gnome-support | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-gnome-support-dbg | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-locale-af | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-locale-ar | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-locale-ast | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-locale-be | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | thunderbird-locale-bg | < 1:91.7.0+build2-0ubuntu0.21.10.1 | UNKNOWN |
ubuntu.com/security/CVE-2022-0566
ubuntu.com/security/CVE-2022-22754
ubuntu.com/security/CVE-2022-22756
ubuntu.com/security/CVE-2022-22759
ubuntu.com/security/CVE-2022-22760
ubuntu.com/security/CVE-2022-22761
ubuntu.com/security/CVE-2022-22763
ubuntu.com/security/CVE-2022-22764
ubuntu.com/security/CVE-2022-26381
ubuntu.com/security/CVE-2022-26383
ubuntu.com/security/CVE-2022-26384
ubuntu.com/security/CVE-2022-26386
ubuntu.com/security/CVE-2022-26387
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.5 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
74.8%