Multiple vulnerabilities in Mozilla Thunderbird



Published: 2021-07-13
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2021-29970
CVE-2021-30547
CVE-2021-29976
CVE-2021-29969
CWE-ID CWE-416
CWE-787
CWE-119
CWE-77
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Mozilla Thunderbird
Client/Desktop applications / Messaging software

Vendor Mozilla

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU54678

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29970

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in accessibility features when processing HTML content. A remote attacker can track the victim to open a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.11.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-30/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds write

EUVDB-ID: #VU54002

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-30547

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted HTML content in ANGLE. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.11.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-30/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Buffer overflow

EUVDB-ID: #VU54679

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29976

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.11.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-30/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Command Injection

EUVDB-ID: #VU54829

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-29969

CWE-ID: CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary commands.

The vulnerability exists in the way Thunderbird handles IMAP server responses sent prior to STARTTLS process. A remote attacker with ability to perform MitM attack can send arbitrary IMAP commands before the STARTTLS handshake and execute them after the handshake is complete.

This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.11.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-30/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###