Lucene search

K
ubuntuUbuntuUSN-6333-1
HistorySep 04, 2023 - 12:00 a.m.

Thunderbird vulnerabilities

2023-09-0400:00:00
ubuntu.com
25
thunderbird
ubuntu
vulnerabilities
filenames
exploit
cross-origin
denial of service
wasm jit
sensitive information
security restrictions
arbitrary code

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.7%

Releases

  • Ubuntu 23.04
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

Junsung Lee discovered that Thunderbird did not properly validate the text
direction override unicode character in filenames. An attacker could
potentially exploits this issue by spoofing file extension while attaching
a file in emails. (CVE-2023-3417)

Max Vlasov discovered that Thunderbird Offscreen Canvas did not properly
track cross-origin tainting. An attacker could potentially exploit this
issue to access image data from another site in violation of same-origin
policy. (CVE-2023-4045)

Alexander Guryanov discovered that Thunderbird did not properly update the
value of a global variable in WASM JIT analysis in some circumstances. An
attacker could potentially exploit this issue to cause a denial of service.
(CVE-2023-4046)

Mark Brand discovered that Thunderbird did not properly validate the size
of an untrusted input stream. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2023-4050)

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-4047, CVE-2023-4048,
CVE-2023-4049, CVE-2023-4055, CVE-2023-4056)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.04noarchthunderbird< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-dbg< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-dev< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-gnome-support< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-gnome-support-dbg< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-locale-af< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-locale-ar< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-locale-ast< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-locale-be< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Ubuntu23.04noarchthunderbird-locale-bg< 1:102.15.0+build1-0ubuntu0.23.04.1UNKNOWN
Rows per page:
1-10 of 2731

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.7%