Multiple vulnerabilities in Mozilla Thunderbird



Published: 2021-08-10
Risk High
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2021-29986
CVE-2021-29988
CVE-2021-29984
CVE-2021-29980
CVE-2021-29985
CVE-2021-29989
CWE-ID CWE-119
CWE-125
CWE-416
Exploitation vector Network
Public exploit Public exploit code for vulnerability #5 is available.
Vulnerable software
Subscribe
Mozilla Thunderbird
Client/Desktop applications / Messaging software

Vendor Mozilla

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU55678

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29986

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a race condition in getaddrinfowhen resolving DNS names. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability affects Linux systems only.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.12.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-35/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds read

EUVDB-ID: #VU55680

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29988

CWE-ID: CWE-125 - Out-of-bounds Read

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary condition when treating inline list-item element as a block element. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger an out-of-bounds read error and execute arbitrary code on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.12.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-35/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Buffer overflow

EUVDB-ID: #VU55682

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29984

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when performing JIT optimization. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.12.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-35/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Memory corruption

EUVDB-ID: #VU55683

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29980

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in a canvas object. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.12.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-35/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Use-after-free

EUVDB-ID: #VU55684

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29985

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a use-after-free error in media channels within the MediaCacheStream::NotifyDataReceived method. A remote attacker can trick the victim to open a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.12.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-35/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Buffer overflow

EUVDB-ID: #VU55685

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-29989

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla Thunderbird: 78.0 - 78.12.0, 68.0 - 68.12.1, 60.0 - 60.9.1


CPE2.3 External links

http://www.mozilla.org/en-US/security/advisories/mfsa2021-35/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###