[MFSA-2017-30] Security vulnerabilities fixed in Thunderbird 52.5.2

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 5
  • CVE-2017-7829: Mailsploit part 1: From address with encoded null character is cut off in message header display (low)
    It is possible to spoof the sender's email address and display an arbitrary sender address to the email recipient. The real sender's address is not displayed if preceded by a null character in the display string.

  • CVE-2017-7845: Buffer overflow when drawing and validating elements with ANGLE library using Direct 3D 9 (critical)
    A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash.
    Note: This attack only affects Windows operating systems. Other operating systems are unaffected.

  • CVE-2017-7846: JavaScript Execution via RSS in mailbox:// origin (high)
    It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via “View -> Feed article -> Website” or in the standard format of “View -> Feed article -> default format”.

  • CVE-2017-7847: Local path string can be leaked from RSS feed (high)
    Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name.

  • CVE-2017-7848: RSS Feed vulnerable to new line Injection (moderate)
    RSS fields can inject new lines into the created email structure, modifying the message body.

Package Affected Version
pkg:mozilla/Thunderbird < 52.5.2
Package Fixed Version
pkg:mozilla/Thunderbird = 52.5.2
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:mozilla/Thunderbird Thunderbird < 52.5.2
Fixed pkg:mozilla/Thunderbird Thunderbird = 52.5.2
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...