QID 376144

Date Published: 2021-12-09

QID 376144: Mozilla Thunderbird Multiple Vulnerabilities (MFSA2021-54)

Thunderbird is a free and open-source cross-platform email client developed for Windows, OS X, and Linux, with a mobile version for Android.

Mozilla Thunderbird is prone to
CVE-2021-43536: URL leakage when navigating while executing asynchronous function
CVE-2021-43537: Heap buffer overflow when using structured clone
CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
CVE-2021-43539: GC rooting failure when calling wasm instance methods
CVE-2021-43541: External protocol handler parameters were unescaped
CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
CVE-2021-43543: Bypass of CSP sandbox directive when embedding
CVE-2021-43545: Denial of Service when using the Location API in a loop
CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
CVE-2021-43528: JavaScript unexpectedly enabled for the composition area

Affected Products:
Prior to Mozilla Thunderbird 91.4.0

QID Detection Logic (Authenticated) :
This checks for vulnerable version of Thunderbird.


Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Vendor has released fix to address these vulnerabilities. Refer to MFSA2021-54 or later
    Software Advisories
    Advisory ID Software Component Link
    MFSA2021-54 URL Logo www.mozilla.org/en-US/security/advisories/mfsa2021-54/