First published: Tue Dec 19 2023(Updated: )
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <115.6 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Mozilla Thunderbird | <115.6 | 115.6 |
redhat/firefox | <115.6 | 115.6 |
redhat/thunderbird | <115.6 | 115.6 |
ubuntu/thunderbird | <1:115.6.0+ | 1:115.6.0+ |
ubuntu/thunderbird | <1:115.6.0+ | 1:115.6.0+ |
ubuntu/thunderbird | <1:115.6.0+ | 1:115.6.0+ |
ubuntu/thunderbird | <1:115.6.0+ | 1:115.6.0+ |
ubuntu/thunderbird | <1:115.6.0-1 | 1:115.6.0-1 |
debian/thunderbird | <=1:91.12.0-1~deb10u1 | 1:115.10.1-1~deb10u1 1:115.7.0-1~deb11u1 1:115.10.1-1~deb11u1 1:115.7.0-1~deb12u1 1:115.10.1-1~deb12u1 1:115.10.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)