CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
69.1%
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.14.0.
Security Fix(es):
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417)
Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | ppc64le | thunderbird-debuginfo | < 102.14.0-1.el7_9 | thunderbird-debuginfo-102.14.0-1.el7_9.ppc64le.rpm |
RedHat | 7 | x86_64 | thunderbird | < 102.14.0-1.el7_9 | thunderbird-102.14.0-1.el7_9.x86_64.rpm |
RedHat | 7 | ppc64le | thunderbird | < 102.14.0-1.el7_9 | thunderbird-102.14.0-1.el7_9.ppc64le.rpm |
RedHat | 7 | x86_64 | thunderbird-debuginfo | < 102.14.0-1.el7_9 | thunderbird-debuginfo-102.14.0-1.el7_9.x86_64.rpm |