Thunderbird Mozilla Thunderbird Email client

Do you want an email whenever new security vulnerabilities are reported in Mozilla Thunderbird?

Recent Mozilla Thunderbird Security Advisories

Advisory Title Published
mfsa2022-43 Security Vulnerabilities fixed in Thunderbird 102.3.1 mfsa2022-43 September 28, 2022
mfsa2022-42 Security Vulnerabilities fixed in Thunderbird 102.3 mfsa2022-42 September 20, 2022
mfsa2022-39 Security Vulnerabilities fixed in Thunderbird 91.13.1 mfsa2022-39 September 19, 2022
mfsa2022-38 Security Vulnerabilities fixed in Thunderbird 102.2.1 mfsa2022-38 August 31, 2022
mfsa2022-36 Security Vulnerabilities fixed in Thunderbird 102.2 mfsa2022-36 August 23, 2022
mfsa2022-37 Security Vulnerabilities fixed in Thunderbird 91.13 mfsa2022-37 August 23, 2022
mfsa2022-31 Security Vulnerabilities fixed in Thunderbird 91.12 mfsa2022-31 July 28, 2022
mfsa2022-32 Security Vulnerabilities fixed in Thunderbird 102.1 mfsa2022-32 July 28, 2022
mfsa2022-26 Security Vulnerabilities fixed in Thunderbird 91.11 and Thunderbird 102 mfsa2022-26 June 28, 2022
mfsa2022-22 Security Vulnerabilities fixed in Thunderbird 91.10 mfsa2022-22 May 31, 2022

By the Year

In 2022 there have been 0 vulnerabilities in Mozilla Thunderbird . Last year Thunderbird had 71 security vulnerabilities published. Right now, Thunderbird is on track to have less security vulnerabilities in 2022 than it did last year.

Year Vulnerabilities Average Score
2022 0 0.00
2021 71 7.26
2020 76 7.61
2019 58 8.35
2018 49 8.26

It may take a day or so for new Thunderbird vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Mozilla Thunderbird Security Vulnerabilities

When interacting with an HTML input element's file picker dialog with webkitdirectory set

CVE-2021-38504 8.8 - High - December 08, 2021

When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Dangling pointer

The iframe sandbox rules were not correctly applied to XSLT stylesheets

CVE-2021-38503 10 - Critical - December 08, 2021

The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

AuthZ

The Opportunistic Encryption feature of HTTP2 (RFC 8164)

CVE-2021-38507 6.5 - Medium - December 08, 2021

The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Origin Validation Error

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation)

CVE-2021-38508 4.3 - Medium - December 08, 2021

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

Due to an unusual sequence of attacker-controlled events

CVE-2021-38509 4.3 - Medium - December 08, 2021

Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

Mozilla developers and community members reported memory safety bugs present in Firefox 93 and Firefox ESR 91.2

CVE-2021-43534 8.8 - High - December 08, 2021

Mozilla developers and community members reported memory safety bugs present in Firefox 93 and Firefox ESR 91.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Memory Corruption

A use-after-free could have occured when an HTTP2 session object was released on a different thread

CVE-2021-43535 8.8 - High - December 08, 2021

A use-after-free could have occured when an HTTP2 session object was released on a different thread, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.3, and Firefox ESR < 91.3.

Dangling pointer

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL

CVE-2021-43536 6.5 - Medium - December 08, 2021

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Exposure of Resource to Wrong Sphere

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages

CVE-2021-43538 4.3 - Medium - December 08, 2021

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Race Condition

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers

CVE-2021-43539 8.8 - High - December 08, 2021

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Dangling pointer

Thunderbird unexpectedly enabled JavaScript in the composition area

CVE-2021-43528 6.5 - Medium - December 08, 2021

Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0.

Improper Privilege Management

An incorrect type conversion of sizes from 64bit to 32bit integers

CVE-2021-43537 8.8 - High - December 08, 2021

An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Incorrect Type Conversion or Cast

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped

CVE-2021-43541 6.5 - Medium - December 08, 2021

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols

CVE-2021-43542 6.5 - Medium - December 08, 2021

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Generation of Error Message Containing Sensitive Information

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content

CVE-2021-43543 6.1 - Medium - December 08, 2021

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

XSS

Using the Location API in a loop could have caused severe application hangs and crashes

CVE-2021-43545 6.5 - Medium - December 08, 2021

Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Excessive Iteration

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor

CVE-2021-43546 4.3 - Medium - December 08, 2021

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Clickjacking

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user

CVE-2021-38506 4.3 - Medium - December 08, 2021

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers

CVE-2021-29991 8.1 - High - November 03, 2021

Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox < 91.0.1 and Thunderbird < 91.0.1.

HTTP Request Smuggling

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13

CVE-2021-38493 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.14, Thunderbird < 78.14, and Firefox < 92.

Memory Corruption

Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0

CVE-2021-38495 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.1 and Firefox ESR < 91.1.

Memory Corruption

During operations on MessageTasks

CVE-2021-38496 8.8 - High - November 03, 2021

During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Dangling pointer

Through use of reportValidity() and window.open()

CVE-2021-38497 6.5 - Medium - November 03, 2021

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Origin Validation Error

During process shutdown

CVE-2021-38498 7.5 - High - November 03, 2021

During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Dangling pointer

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38500 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38501 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection

CVE-2021-38502 5.9 - Medium - November 03, 2021

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.

Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12

CVE-2021-29989 8.8 - High - August 17, 2021

Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.13, Firefox ESR < 78.13, and Firefox < 91.

Memory Corruption

An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code

CVE-2021-29981 8.8 - High - August 17, 2021

An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code that would lead to a potentially exploitable crash. This vulnerability affects Firefox < 91 and Thunderbird < 91.

Due to incorrect JIT optimization, we incorrectly interpreted data

CVE-2021-29982 6.5 - Medium - August 17, 2021

Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox < 91 and Thunderbird < 91.

Missing Release of Resource after Effective Lifetime

Instruction reordering resulted in a sequence of instructions

CVE-2021-29984 8.8 - High - August 17, 2021

Instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection. This led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.13, Thunderbird < 91, Firefox ESR < 78.13, and Firefox < 91.

Memory Corruption

A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash

CVE-2021-29985 8.8 - High - August 17, 2021

A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.13, Thunderbird < 91, Firefox ESR < 78.13, and Firefox < 91.

Dangling pointer

Firefox incorrectly treated an inline list-item element as a block element

CVE-2021-29988 8.8 - High - August 17, 2021

Firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.13, Thunderbird < 91, Firefox ESR < 78.13, and Firefox < 91.

Out-of-bounds Read

Uninitialized memory in a

CVE-2021-29980 8.8 - High - August 17, 2021

Uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.13, Thunderbird < 91, Firefox ESR < 78.13, and Firefox < 91.

Missing Initialization of Resource

If Thunderbird was configured to use STARTTLS for an IMAP connection

CVE-2021-29969 5.9 - Medium - August 05, 2021

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

Files or Directories Accessible to External Parties

A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash

CVE-2021-29970 8.8 - High - August 05, 2021

A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *This bug could only be triggered when accessibility was enabled.*. This vulnerability affects Thunderbird < 78.12, Firefox ESR < 78.12, and Firefox < 90.

Memory Corruption

Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird

CVE-2021-29976 8.8 - High - August 05, 2021

Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.12, Firefox ESR < 78.12, and Firefox < 90.

Memory Corruption

Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task

CVE-2021-29950 7.5 - High - June 24, 2021

Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.

Cleartext Storage of Sensitive Information

Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11

CVE-2021-29967 8.8 - High - June 24, 2021

Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.11, Firefox < 89, and Firefox ESR < 78.11.

Memory Corruption

Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header

CVE-2021-29946 8.8 - High - June 24, 2021

Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Integer Overflow or Wraparound

If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate

CVE-2021-29957 4.3 - Medium - June 24, 2021

If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected. This vulnerability affects Thunderbird < 78.10.2.

When loading the shared library

CVE-2021-29949 7.8 - High - June 24, 2021

When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.

DLL preloading

Signatures are written to disk before and read during verification

CVE-2021-29948 2.5 - Low - June 24, 2021

Signatures are written to disk before and read during verification, which might be subject to a race condition when a malicious local process or user is replacing the file. This vulnerability affects Thunderbird < 78.10.

Race Condition

The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash

CVE-2021-29945 6.5 - Medium - June 24, 2021

The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Incorrect Calculation

OpenPGP secret keys

CVE-2021-29956 4.3 - Medium - June 24, 2021

OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird < 78.10.2.

Cleartext Storage of Sensitive Information

If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges

CVE-2021-23999 8.8 - High - June 24, 2021

If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Improper Privilege Management

Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page

CVE-2021-23998 6.5 - Medium - June 24, 2021

Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Insufficient Verification of Data Authenticity

When Responsive Design Mode was enabled, it used references to objects that were previously freed

CVE-2021-23995 8.8 - High - June 24, 2021

When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Operation on a Resource after Expiration or Release

A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write

CVE-2021-23994 8.8 - High - June 24, 2021

A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Missing Initialization of Resource

An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent

CVE-2021-23993 6.5 - Medium - June 24, 2021

An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.

Use of a Broken or Risky Cryptographic Algorithm

Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature

CVE-2021-23992 4.3 - Medium - June 24, 2021

Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.

Improper Verification of Cryptographic Signature

If a Thunderbird user has previously imported Alice's OpenPGP key

CVE-2021-23991 6.8 - Medium - June 24, 2021

If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.

When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and

CVE-2021-24002 8.8 - High - June 24, 2021

When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Argument Injection

Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8

CVE-2021-23987 8.8 - High - March 31, 2021

Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.

Memory Corruption

A malicious extension could have opened a popup window lacking an address bar

CVE-2021-23984 6.5 - Medium - March 31, 2021

A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.

Authentication Bypass by Spoofing

Using techniques that built on the slipstream research, a malicious webpage could have s

CVE-2021-23982 6.5 - Medium - March 31, 2021

Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.

Inadequate Encryption Strength

A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it

CVE-2021-23981 8.1 - High - March 31, 2021

A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.

Memory Corruption

Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7

CVE-2021-23978 8.8 - High - February 26, 2021

Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6

CVE-2021-23964 8.8 - High - February 26, 2021

Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

Memory Corruption

Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash

CVE-2021-23960 8.8 - High - February 26, 2021

Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion

CVE-2021-23954 8.8 - High - February 26, 2021

Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

Object Type Confusion

If a user clicked into a specifically crafted PDF

CVE-2021-23953 4.3 - Medium - February 26, 2021

If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of

CVE-2021-23973 6.5 - Medium - February 26, 2021

When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

Generation of Error Message Containing Sensitive Information

As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure

CVE-2021-23969 4.3 - Medium - February 26, 2021

As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If thats not possible, user agents need to strip the URL down to an origin to avoid unintentional leakage." Under certain types of redirects, Firefox incorrectly set the source file to be the destination of the redirects. This was fixed to be the redirect destination's origin. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

If Content Security Policy blocked frame navigation

CVE-2021-23968 4.3 - Medium - February 26, 2021

If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such URIs. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

Generation of Error Message Containing Sensitive Information

Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5

CVE-2020-35113 8.8 - High - January 07, 2021

Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

Memory Corruption

When an extension with the proxy permission registered to receive <all_urls>

CVE-2020-35111 4.3 - Medium - January 07, 2021

When an extension with the proxy permission registered to receive <all_urls>, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently leaked their IP address. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

Using techniques that built on the slipstream research

CVE-2020-26978 6.1 - Medium - January 07, 2021

Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type

CVE-2020-26974 8.8 - High - January 07, 2021

When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

Memory Corruption

Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed

CVE-2020-26973 8.8 - High - January 07, 2021

Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers

CVE-2020-26971 8.8 - High - January 07, 2021

Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

Memory Corruption

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges

CVE-2020-26961 6.5 - Medium - December 09, 2020

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

In certain circumstances, the MCallGetProperty opcode

CVE-2020-26950 8.8 - High - December 09, 2020

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

Dangling pointer

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization

CVE-2020-26951 6.1 - Medium - December 09, 2020

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

XSS

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user

CVE-2020-26953 4.3 - Medium - December 09, 2020

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

Clickjacking

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS

CVE-2020-26956 6.1 - Medium - December 09, 2020

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

XSS

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker

CVE-2020-26958 6.1 - Medium - December 09, 2020

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

XSS

If the Compact() method was called on an nsTArray

CVE-2020-26960 8.8 - High - December 09, 2020

If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

Dangling pointer

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field

CVE-2020-26965 6.5 - Medium - December 09, 2020

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

Improper Removal of Sensitive Information Before Storage or Transfer

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4

CVE-2020-26968 8.8 - High - December 09, 2020

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

Memory Corruption

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack

CVE-2020-26970 8.8 - High - December 09, 2020

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

Memory Corruption

During browser shutdown

CVE-2020-26959 8.8 - High - December 09, 2020

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

Dangling pointer

Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3

CVE-2020-15683 9.8 - Critical - October 22, 2020

Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4.

Memory Corruption

If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism

CVE-2020-15646 5.9 - Medium - October 08, 2020

If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker. This vulnerability affects Thunderbird < 68.10.0.

Insufficiently Protected Credentials

If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe

CVE-2020-15663 8.8 - High - October 01, 2020

If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with system privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with System Privileges. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 80, Thunderbird < 78.2, Thunderbird < 68.12, Firefox ESR < 68.12, and Firefox ESR < 78.2.

DLL preloading

By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would

CVE-2020-15664 6.5 - Medium - October 01, 2020

By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extension being installed. This vulnerability affects Firefox < 80, Thunderbird < 78.2, Thunderbird < 68.12, Firefox ESR < 68.12, Firefox ESR < 78.2, and Firefox for Android < 80.

AuthZ

When aborting an operation, such as a fetch, an abort signal may be deleted while alerting the objects to be notified

CVE-2020-15669 8.8 - High - October 01, 2020

When aborting an operation, such as a fetch, an abort signal may be deleted while alerting the objects to be notified. This results in a use-after-free and we presume that with enough effort it could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.12 and Thunderbird < 68.12.

Dangling pointer

Mozilla developers reported memory safety bugs present in Firefox for Android 79

CVE-2020-15670 8.8 - High - October 01, 2020

Mozilla developers reported memory safety bugs present in Firefox for Android 79. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 80, Firefox ESR < 78.2, Thunderbird < 78.2, and Firefox for Android < 80.

Release of Invalid Pointer or Reference

Firefox sometimes ran the onload handler for SVG elements

CVE-2020-15676 6.1 - Medium - October 01, 2020

Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

XSS

By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering

CVE-2020-15677 6.1 - Medium - October 01, 2020

By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

Open Redirect

When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free

CVE-2020-15678 8.8 - High - October 01, 2020

When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

Dangling pointer

Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2

CVE-2020-15673 8.8 - High - October 01, 2020

Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

Dangling pointer

When in an endless loop

CVE-2020-15654 6.5 - Medium - August 10, 2020

When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.

Infinite Loop

Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header

CVE-2020-15648 6.5 - Medium - August 10, 2020

Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header. This vulnerability affects Thunderbird < 78 and Firefox < 78.0.2.

Clickjacking

By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect

CVE-2020-15652 6.5 - Medium - August 10, 2020

By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.

Origin Validation Error

An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links

CVE-2020-15653 6.5 - Medium - August 10, 2020

An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.

JIT optimizations involving the Javascript arguments object could confuse later optimizations

CVE-2020-15656 8.8 - High - August 10, 2020

JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.

Object Type Confusion

A redirected HTTP request

CVE-2020-15655 6.5 - Medium - August 10, 2020

A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.

Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0

CVE-2020-15659 8.8 - High - August 10, 2020

Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.

Memory Corruption

The code for downloading files did not properly take care of special characters

CVE-2020-15658 6.5 - Medium - August 10, 2020

The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.

Improper Check for Unusual or Exceptional Conditions

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Mozilla Thunderbird or by Mozilla? Click the Watch button to subscribe.

Mozilla
Vendor

Mozilla Thunderbird
Email client

subscribe