First published: Tue May 05 2020(Updated: )
By encoding Unicode whitespace characters within the From email header, an attacker can spoof the sender email address that Thunderbird displays.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <68.8 | 68.8 |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.15.0-1~deb11u1 1:115.12.0-1~deb12u1 1:115.15.0-1~deb12u1 1:128.1.1esr-1 1:128.2.0esr-1 | |
Mozilla Thunderbird | <68.8.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-12397 has been rated as a low severity vulnerability.
To fix CVE-2020-12397, upgrade to Mozilla Thunderbird version 68.9 or later.
CVE-2020-12397 is associated with email header spoofing using encoded Unicode whitespace characters.
CVE-2020-12397 affects Mozilla Thunderbird versions prior to 68.9.
CVE-2020-12397 is related to Mozilla Thunderbird and can be found on multiple operating systems where the affected versions are used.