Lucene search

K
mageiaGentoo FoundationMGASA-2023-0057
HistoryFeb 21, 2023 - 12:25 a.m.

Updated thunderbird packages fix security vulnerability

2023-02-2100:25:36
Gentoo Foundation
advisories.mageia.org
40
thunderbird
security vulnerability
ui lockup
content security policy
screen hijack
arbitrary memory write
use-after-free
security patch
web crypto
memory safety
unix

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

65.5%

User Interface lockup with messages combining S/MIME and OpenPGP. (CVE-2023-0616) Content security policy leak in violation reports using iframes. (CVE-2023-25728) Screen hijack via browser fullscreen mode. (CVE-2023-25730) Arbitrary memory write via PKCS 12 in NSS. (CVE-2023-0767) Potential use-after-free from compartment mismatch in SpiderMonkey. (CVE-2023-25735) Invalid downcast in SVGUtils::SetupStrokeGeometry. (CVE-2023-25737) Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext. (CVE-2023-25739) Extensions could have opened external schemes without user knowledge. (CVE-2023-25729) Out of bounds memory write from EncodeInputStream. (CVE-2023-25732) Web Crypto ImportKey crashes tab. (CVE-2023-25742) Memory safety bugs fixed in Thunderbird 102.8. (CVE-2023-25746)

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

65.5%