[MFSA-2024-04] Security Vulnerabilities fixed in Thunderbird 115.7
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
CVE-2024-0741: Out of bounds write in ANGLE (high)
An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash.CVE-2024-0742: Failure to update user input timestamp (high)
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load.CVE-2024-0746: Crash when listing printers on Linux (moderate)
A Linux user opening the print preview dialog could have caused the browser to crash.CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set (moderate)
When a parent page loaded a child in an iframe with <code>unsafe-inline</code>, the parent Content Security Policy could have overridden the child Content Security Policy.CVE-2024-0749: Phishing site popup could show local origin in address bar (moderate)
A phishing site could have repurposed an <code>about:</code> dialog to show phishing content with an incorrect origin in the address bar.CVE-2024-0750: Potential permissions request bypass via clickjacking (moderate)
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions.CVE-2024-0751: Privilege escalation through devtools (moderate)
A malicious devtools extension could have been used to escalate privileges.CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain (moderate)
In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain.CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (moderate)
Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
Package | Affected Version |
---|---|
pkg:mozilla/Thunderbird | < 115.7 |
Package | Fixed Version |
---|---|
pkg:mozilla/Thunderbird | = 115.7 |
- ID
- MFSA-2024-04
- Severity
- high
- URL
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
- Modified
-
1970-01-01T00:00:00
(55 years ago) - Other Advisories
-
- ALAS2-2024-2440
- ALPINE:CVE-2024-0741
- ALPINE:CVE-2024-0742
- ALPINE:CVE-2024-0746
- ALPINE:CVE-2024-0747
- ALPINE:CVE-2024-0750
- ALPINE:CVE-2024-0751
- ALPINE:CVE-2024-0753
- ALPINE:CVE-2024-0755
- ALSA-2024:0602
- ALSA-2024:0603
- ALSA-2024:0608
- ALSA-2024:0609
- DSA-5605-1
- DSA-5606-1
- ELSA-2024-0600
- ELSA-2024-0601
- ELSA-2024-0602
- ELSA-2024-0603
- ELSA-2024-0608
- ELSA-2024-0609
- GLSA-202402-25
- GLSA-202402-26
- MFSA-2024-01
- MFSA-2024-02
- RHSA-2024:0600
- RHSA-2024:0601
- RHSA-2024:0602
- RHSA-2024:0603
- RHSA-2024:0608
- RHSA-2024:0609
- RLSA-2024:0608
- RLSA-2024:0609
- SSA:2024-023-01
- SSA:2024-023-02
- SUSE-SU-2024:0211-1
- SUSE-SU-2024:0228-1
- SUSE-SU-2024:0229-1
- SUSE-SU-2024:0242-1
- USN-6610-1
- USN-6669-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:mozilla/Thunderbird | Thunderbird | < 115.7 | ||||
Fixed | pkg:mozilla/Thunderbird | Thunderbird | = 115.7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |