Latest mozilla thunderbird Vulnerabilities

If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox<125
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
and 6 more
On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox < 125, Firefox ES...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox<125
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
and 6 more
In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox<125
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
and 6 more
Security Vulnerabilities fixed in Thunderbird 115.10
Mozilla Thunderbird<115.10
GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox<125
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
and 6 more
The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, a...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox<125
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
and 6 more
Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited ...
redhat/firefox<115.10
redhat/thunderbird<115.10
debian/firefox
debian/firefox-esr<=91.12.0esr-1~deb10u1<=115.7.0esr-1~deb11u1<=115.7.0esr-1~deb12u1<=115.8.0esr-1
debian/thunderbird<=1:91.12.0-1~deb10u1<=1:115.7.0-1~deb11u1<=1:115.7.0-1~deb12u1
Mozilla Firefox<125
and 6 more
Per initial information provided via VINCE: Mozilla has reserved <a href="https://access.redhat.com/security/cve/CVE-2024-3302">CVE-2024-3302</a> for this issue in the Gecko networking implementation...
Mozilla Firefox<125
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
redhat/firefox<115.10
redhat/thunderbird<115.10
ubuntu/firefox<125.0.2+
and 6 more
The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites.
Mozilla Firefox<124
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
ubuntu/firefox<124.0+
ubuntu/thunderbird<1:115.10.1+
and 6 more
`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an o...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox < 124, Firefox ESR < 115.9...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating system...
<115.9
Mozilla Firefox<124
Mozilla Thunderbird<115.9
Security Vulnerabilities fixed in Thunderbird 115.9
Mozilla Thunderbird<115.9
If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Fir...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR < 115.9 and Thunderbird < 115....
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/thunderbird<1:115.9.0+
ubuntu/thunderbird<1:115.9.0+
and 3 more
A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderb...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnera...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
Security Vulnerabilities fixed in Thunderbird 115.8.1
Mozilla Thunderbird<115.8.1
The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminate...
Mozilla Thunderbird<115.8.1
redhat/thunderbird<115.8.1
ubuntu/thunderbird<1:115.8.1+
ubuntu/thunderbird<1:115.8.1+
ubuntu/thunderbird<115.8.1+
ubuntu/thunderbird<1:115.8.1-1
and 1 more
A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Fire...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox E...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, the...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). This vulnerability affects Firefox ...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulner...
Mozilla Firefox ESR<115.8
Mozilla Firefox<123
Mozilla Thunderbird<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.8
Mozilla Firefox<123
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
Security Vulnerabilities fixed in Thunderbird 115.8
Mozilla Thunderbird<115.8
Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123...
Mozilla Firefox ESR<115.8
Mozilla Firefox<123
Mozilla Thunderbird<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
Mozilla Firefox ESR<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox < 122.
Mozilla Firefox<122
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
Mozilla Firefox<122.0
redhat/firefox<115.9
redhat/thunderbird<115.9
and 8 more
In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 12...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
Security Vulnerabilities fixed in Thunderbird 115.7
Mozilla Thunderbird<115.7
A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A malicious devtools extension could have been used to escalate privileges.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderb...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 8 more
Security Vulnerabilities fixed in Thunderbird 115.6
Mozilla Thunderbird<115.6
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thund...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the messa...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
and 6 more
Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfs...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
and 10 more
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the ...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
and 6 more
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux,...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
Mozilla Firefox<121
redhat/firefox<115.6
redhat/thunderbird<115.6
ubuntu/firefox<121.0+
and 16 more
The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203