First published: Mon Jan 23 2023(Updated: )
Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/thunderbird | <=1:91.12.0-1~deb10u1 | 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 |
Thunderbird | <102.7.1 | 102.7.1 |
Thunderbird | >=68.0<102.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0430 has been classified as a high severity vulnerability due to the risk of displaying a valid signature for emails signed with revoked certificates.
To fix CVE-2023-0430, upgrade to Thunderbird version 102.7.1 or later.
CVE-2023-0430 affects Thunderbird versions from 68.0 up to, but not including, 102.7.1.
CVE-2023-0430 undermines email security by allowing emails signed with revoked certificates to appear as valid, potentially leading to trust issues.
Yes, the OCSP check is critical for verifying the revocation status of certificates to ensure the integrity of email signatures.