QID 378967

Date Published: 2023-10-25

QID 378967: Mozilla Thunderbird Multiple Vulnerabilities (MFSA2023-47)

Thunderbird is a free and open-source cross-platform email client developed for Windows, OS X, and Linux, with a mobile version for Android.

Mozilla Thunderbird is prone to
CVE-2023-5721: Queued up rendering could have allowed websites to clickjack
CVE-2023-5732: Address bar spoofing via bidirectional characters
CVE-2023-5724: Large WebGL draw could have led to a crash
CVE-2023-5725: WebExtensions could open arbitrary URLs
CVE-2023-5726: Full screen notification obscured by file open dialog on macOS
CVE-2023-5727: Download Protections were bypassed by .msix, .msixbundle, .appx, and .appxbundle files on Windows
CVE-2023-5728: Improper object tracking during GC in the JavaScript engine could have led to a crash.
CVE-2023-5730: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4.1

Affected Products:
Prior to Mozilla Thunderbird 115.4.1

QID Detection Logic (Authenticated) :
This checks for vulnerable version of Thunderbird.


Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Vendor has released fix to address these vulnerabilities. Upgrade to Thunderbird 115.4.1 to fix vulnerability, you can also refer MFSA2023-47 or later for more details.
    Software Advisories
    Advisory ID Software Component Link
    MFSA2023-47 URL Logo www.mozilla.org/en-US/security/advisories/mfsa2023-47/