QID 376144
Date Published: 2021-12-09
QID 376144: Mozilla Thunderbird Multiple Vulnerabilities (MFSA2021-54)
Thunderbird is a free and open-source cross-platform email client developed for Windows, OS X, and Linux, with a mobile version for Android.
Mozilla Thunderbird is prone to
CVE-2021-43536: URL leakage when navigating while executing asynchronous function
CVE-2021-43537: Heap buffer overflow when using structured clone
CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
CVE-2021-43539: GC rooting failure when calling wasm instance methods
CVE-2021-43541: External protocol handler parameters were unescaped
CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
CVE-2021-43543: Bypass of CSP sandbox directive when embedding
CVE-2021-43545: Denial of Service when using the Location API in a loop
CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
CVE-2021-43528: JavaScript unexpectedly enabled for the composition area
Affected Products:
Prior to Mozilla Thunderbird 91.4.0
QID Detection Logic (Authenticated) :
This checks for vulnerable version of Thunderbird.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
- MFSA2021-54 -
www.mozilla.org/en-US/security/advisories/mfsa2021-54/
CVEs related to QID 376144
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| MFSA2021-54 |
|