Vulnerability identifier: #VU67553
Vulnerability risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-254
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Mozilla Thunderbird
Client/Desktop applications /
Messaging software
Vendor: Mozilla
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insecure handling of email attachments in Thunderbird on macOS. The application does not set attribute com.apple.quarantine on the received file, as a result, If the received file is an application and the user attempts to open it, then the application is being executed immediately without asking the user to confirm.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Mozilla Thunderbird: 102.0 - 102.2.2
External links
http://www.mozilla.org/en-US/security/advisories/mfsa2022-42/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.