QID 379172

Date Published: 2023-12-21

QID 379172: Mozilla Thunderbird Multiple Vulnerabilities (MFSA2023-55)

Thunderbird is a free and open-source cross-platform email client developed for Windows, OS X, and Linux, with a mobile version for Android.

Mozilla Thunderbird is prone to
CVE-2023-50762: Truncated signed text was shown with a valid OpenPGP signature
CVE-2023-50761: S/MIME signature accepted despite mismatching message date
CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver
CVE-2023-6857: Symlinks may resolve to smaller than expected buffers
CVE-2023-6858: Heap buffer overflow in nsTextFragment
CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer
CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation
CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode
CVE-2023-6862: Use-after-free in nsDNSService
CVE-2023-6863: Undefined behavior in ShutdownObserver()
CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6

Affected Products:
Prior to Mozilla Thunderbird 115.6

QID Detection Logic (Authenticated) :
This checks for vulnerable version of Thunderbird.


Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Vendor has released fix to address these vulnerabilities. Upgrade to Thunderbird 115.6 to fix vulnerability, you can also refer MFSA2023-55 or later for more details.
    Software Advisories
    Advisory ID Software Component Link
    MFSA2023-55 URL Logo www.mozilla.org/en-US/security/advisories/mfsa2023-55/