First published: Tue Feb 15 2022(Updated: )
A flaw was found in Thunderbird. The vulnerability occurs due to an out-of-bounds write of one byte when processing the message. This flaw allows an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thunderbird | <0:91.7.0-2.el7_9 | 0:91.7.0-2.el7_9 |
redhat/thunderbird | <0:91.7.0-2.el8_5 | 0:91.7.0-2.el8_5 |
redhat/thunderbird | <0:91.7.0-2.el8_1 | 0:91.7.0-2.el8_1 |
redhat/thunderbird | <0:91.7.0-2.el8_2 | 0:91.7.0-2.el8_2 |
redhat/thunderbird | <0:91.7.0-2.el8_4 | 0:91.7.0-2.el8_4 |
redhat/Thunderbird | <91.6.1 | 91.6.1 |
Thunderbird | <91.6.1 | 91.6.1 |
Thunderbird | <91.6.1 | |
<91.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0566 is rated as a high severity vulnerability due to its potential impact on the Thunderbird email client.
To fix CVE-2022-0566, users should update Thunderbird to version 91.6.1 or later.
CVE-2022-0566 affects Mozilla Thunderbird versions prior to 91.6.1.
Yes, CVE-2022-0566 could potentially allow attackers to execute arbitrary code through specially crafted email messages.
The specific patch for CVE-2022-0566 is included in Thunderbird version 91.6.1 and later.