Lucene search

K
mozillaMozilla FoundationMFSA2023-24
HistoryJul 04, 2023 - 12:00 a.m.

Security Vulnerabilities fixed in Thunderbird 102.13 — Mozilla

2023-07-0400:00:00
Mozilla Foundation
www.mozilla.org
75
thunderbird
mozilla
security vulnerabilities
webrtc
cross-compartment wrappers
fullscreen notification
diagcab files
memory safety bugs

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.5%

An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS.
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free.
A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks.
When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code.
Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Affected configurations

Vulners
Node
mozillathunderbirdRange<102.13

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.5%