First published: Tue Feb 11 2020(Updated: )
If a user saved passwords before Thunderbird 60 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Thunderbird 60. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <68.5.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Mozilla Thunderbird | <68.5 | 68.5 |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.5.0esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.5.0esr-1~deb12u1 1:128.5.2esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-6794 is a vulnerability in Thunderbird that allows access to unencrypted passwords if a user saved passwords before Thunderbird 60 and later set a master password.
The vulnerability affects Thunderbird versions up to and including 68.5.0.
CVE-2020-6794 has a severity rating of 6.5 (Medium).
To fix CVE-2020-6794, update Thunderbird to version 68.7.0 or later.
You can find more information about CVE-2020-6794 in the following references: [Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1606619), [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2020-07/), [Gentoo Security Advisory](https://security.gentoo.org/glsa/202003-10).