CVE-2023-3417

Summary

CVECVE-2023-3417
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-07-24 11:15:00 UTC
Updated2023-08-01 17:53:00 UTC
DescriptionThunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird < 115.0.1 and Thunderbird < 102.13.1.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 11.0 All All All
Operating System Debian Debian Linux 12.0 All All All
Application Mozilla Thunderbird All All All All

References

ReferenceSourceLinkTags
Security Vulnerabilities fixed in Thunderbird 102.13.1 — Mozilla MISC www.mozilla.org
Access Denied MISC bugzilla.mozilla.org
[SECURITY] [DLA 3510-1] thunderbird security update MISC lists.debian.org
Security Vulnerabilities fixed in Thunderbird 115.0.1 — Mozilla MISC www.mozilla.org
Debian -- Security Information -- DSA-5463-1 thunderbird MISC www.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160844 Oracle Enterprise Linux Security Update for thunderbird (ELSA-2023-4495)
  • 160845 Oracle Enterprise Linux Security Update for thunderbird (ELSA-2023-4499)
  • 160849 Oracle Enterprise Linux Security Update for thunderbird (ELSA-2023-4497)
  • 241915 Red Hat Update for thunderbird (RHSA-2023:4500)
  • 241916 Red Hat Update for thunderbird (RHSA-2023:4494)
  • 241918 Red Hat Update for thunderbird (RHSA-2023:4499)
  • 241919 Red Hat Update for thunderbird (RHSA-2023:4497)
  • 241920 Red Hat Update for thunderbird (RHSA-2023:4495)
  • 241921 Red Hat Update for thunderbird (RHSA-2023:4492)
  • 241922 Red Hat Update for thunderbird (RHSA-2023:4496)
  • 241923 Red Hat Update for thunderbird (RHSA-2023:4493)
  • 257268 Centos Security Update for thunderbird
  • 356151 Amazon Linux Security Advisory for thunderbird : ALAS2-2023-2248
  • 378685 Mozilla Thunderbird Multiple Vulnerabilities (MFSA2023-27)
  • 378694 Mozilla Thunderbird Multiple Vulnerabilities (MFSA2023-28)
  • 6000097 Debian Security Update for thunderbird (DLA 3510-1)
  • 6000229 Debian Security Update for thunderbird (DSA 5463-1)
  • 710875 Gentoo Linux Mozilla Thunderbird Multiple Vulnerabilities (GLSA 202402-25)
  • 941211 AlmaLinux Security Update for thunderbird (ALSA-2023:4497)
  • 941212 AlmaLinux Security Update for thunderbird (ALSA-2023:4499)
  • 960959 Rocky Linux Security Update for thunderbird (RLSA-2023:4499)
  • 960974 Rocky Linux Security Update for thunderbird (RLSA-2023:4497)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report