Mozilla Thunderbird Email client
Recent Mozilla Thunderbird Security Advisories
Advisory | Title | Published |
---|---|---|
mfsa2023-11 | Security Vulnerabilities fixed in Thunderbird 102.9 mfsa2023-11 | March 14, 2023 |
mfsa2023-07 | Security Vulnerabilities fixed in Thunderbird 102.8 mfsa2023-07 | February 15, 2023 |
mfsa2023-04 | Security Vulnerabilities fixed in Thunderbird 102.7.1 mfsa2023-04 | January 23, 2023 |
mfsa2023-03 | Security Vulnerabilities fixed in Thunderbird 102.7 mfsa2023-03 | January 18, 2023 |
mfsa2022-54 | Security Vulnerabilities fixed in Thunderbird 102.6.1 mfsa2022-54 | December 20, 2022 |
mfsa2022-53 | Security Vulnerabilities fixed in Thunderbird 102.6 mfsa2022-53 | December 13, 2022 |
mfsa2022-50 | Security Vulnerabilities fixed in Thunderbird 102.5.1 mfsa2022-50 | November 30, 2022 |
mfsa2022-49 | Security Vulnerabilities fixed in Thunderbird 102.5 mfsa2022-49 | November 15, 2022 |
mfsa2022-46 | Security Vulnerabilities fixed in Thunderbird 102.4 mfsa2022-46 | October 18, 2022 |
mfsa2022-43 | Security Vulnerabilities fixed in Thunderbird 102.3.1 mfsa2022-43 | September 28, 2022 |
By the Year
In 2023 there have been 1 vulnerability in Mozilla Thunderbird with an average score of 9.8 out of ten. Last year Thunderbird had 104 security vulnerabilities published. Right now, Thunderbird is on track to have less security vulnerabilities in 2023 than it did last year. However, the average CVE base score of the vulnerabilities in 2023 is greater by 2.21.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 1 | 9.80 |
2022 | 104 | 7.59 |
2021 | 72 | 7.24 |
2020 | 76 | 7.61 |
2019 | 58 | 8.35 |
2018 | 49 | 8.26 |
It may take a day or so for new Thunderbird vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Mozilla Thunderbird Security Vulnerabilities
Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages
CVE-2021-43529
9.8 - Critical
- February 16, 2023
Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages. Thunderbird versions 91.3.0 and later will not call the vulnerable code when processing S/MIME messages that contain certificates with DER-encoded DSA or RSA-PSS signatures.
Memory Corruption
When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead
CVE-2022-40956
6.1 - Medium
- December 22, 2022
When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
XSS
Certain network request objects were freed too early when releasing a network request handle
CVE-2022-22740
8.8 - High
- December 22, 2022
Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Dangling pointer
Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol
CVE-2022-22739
6.5 - Medium
- December 22, 2022
Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Applying a CSS filter effect could have accessed out of bounds memory
CVE-2022-22738
8.8 - High
- December 22, 2022
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Memory Corruption
Constructing audio sinks could have lead to a race condition when playing audio files and closing windows
CVE-2022-22737
7.5 - High
- December 22, 2022
Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Dangling pointer
When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird
CVE-2022-1834
6.5 - Medium
- December 22, 2022
When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird < 91.10.
Improper Certificate Validation
If an attacker was able to corrupt the methods of an Array object in JavaScript
CVE-2022-1802
8.8 - High
- December 22, 2022
If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
Prototype Pollution
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object
CVE-2022-1529
8.8 - High
- December 22, 2022
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
Prototype Pollution
When viewing an email message A
CVE-2022-1520
4.3 - Medium
- December 22, 2022
When viewing an email message A, which contains an attached message B, where B is encrypted or digitally signed or both, Thunderbird may show an incorrect encryption or signature status. After opening and viewing the attached message B, when returning to the display of message A, the message A might be shown with the security status of message B. This vulnerability affects Thunderbird < 91.9.
Inadequate Encryption Strength
When importing a revoked key
CVE-2022-1197
5.4 - Medium
- December 22, 2022
When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected. This vulnerability affects Thunderbird < 91.8.
Improper Certificate Validation
<code>NSSToken</code> objects were referenced
CVE-2022-1097
6.5 - Medium
- December 22, 2022
<code>NSSToken</code> objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Dangling pointer
It may be possible for an attacker to craft an email message
CVE-2022-0566
8.8 - High
- December 22, 2022
It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message. This vulnerability affects Thunderbird < 91.6.1.
Memory Corruption
Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations
CVE-2022-22745
6.5 - Medium
- December 22, 2022
Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
When navigating from inside an iframe while requesting fullscreen access
CVE-2022-22743
4.3 - Medium
- December 22, 2022
When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
When inserting text while in edit mode
CVE-2022-22742
6.5 - Medium
- December 22, 2022
When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Out-of-bounds Read
When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode
CVE-2022-22741
7.5 - High
- December 22, 2022
When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
After a VR Process is destroyed
CVE-2022-1196
6.5 - Medium
- December 22, 2022
After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8.
Dangling pointer
If a document created a sandboxed iframe without <code>allow-scripts</code>, and subsequently appended an element to the iframe's document
CVE-2022-22759
9.6 - Critical
- December 22, 2022
If a document created a sandboxed iframe without <code>allow-scripts</code>, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
Mozilla developers Calixte Denizet
CVE-2022-22751
8.8 - High
- December 22, 2022
Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Memory Corruption
If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script
CVE-2022-22756
8.8 - High
- December 22, 2022
If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt
CVE-2022-22754
6.5 - Medium
- December 22, 2022
If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
AuthZ
Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol
CVE-2022-22748
6.5 - Medium
- December 22, 2022
Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash
CVE-2022-22747
6.5 - Medium
- December 22, 2022
After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Improper Certificate Validation
Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5
CVE-2022-22764
8.8 - High
- December 22, 2022
Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
Buffer Overflow
When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible
CVE-2022-22763
8.8 - High
- December 22, 2022
When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox < 96, Thunderbird < 91.6, and Firefox ESR < 91.6.
Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy
CVE-2022-22761
8.8 - High
- December 22, 2022
Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
When importing resources using Web Workers, error messages
CVE-2022-22760
6.5 - Medium
- December 22, 2022
When importing resources using Web Workers, error messages would distinguish the difference between <code>application/javascript</code> responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
Generation of Error Message Containing Sensitive Information
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free
CVE-2022-26485
8.8 - High
- December 22, 2022
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
Dangling pointer
When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox
CVE-2022-26387
7.5 - High
- December 22, 2022
When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
TOCTTOU
When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification
CVE-2022-26383
4.3 - Medium
- December 22, 2022
When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash
CVE-2022-26381
8.8 - High
- December 22, 2022
An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
Dangling pointer
The Mozilla Fuzzing Team reported potential vulnerabilities present in Thunderbird 91.10
CVE-2022-34484
8.8 - High
- December 22, 2022
The Mozilla Fuzzing Team reported potential vulnerabilities present in Thunderbird 91.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
assertion failure
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function
CVE-2022-34481
8.8 - High
- December 22, 2022
In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Integer Overflow or Wraparound
An iframe that was not permitted to run scripts could do so if the user clicked on a <code>javascript:</code> link
CVE-2022-34468
8.8 - High
- December 22, 2022
An iframe that was not permitted to run scripts could do so if the user clicked on a <code>javascript:</code> link. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin
CVE-2022-29909
8.8 - High
- December 22, 2022
Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Incorrect Default Permissions
Mozilla developers and community members Nika Layzell
CVE-2022-28289
8.8 - High
- December 22, 2022
Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 91.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Memory Corruption
Due to a layout change, iframe contents could have been rendered outside of its border
CVE-2022-28286
5.4 - Medium
- December 22, 2022
Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Clickjacking
When generating the assembly code for <code>MLoadTypedArrayElementHole</code>, an incorrect AliasSet was used
CVE-2022-28285
6.5 - Medium
- December 22, 2022
When generating the assembly code for <code>MLoadTypedArrayElementHole</code>, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer
CVE-2022-28282
6.5 - Medium
- December 22, 2022
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Dangling pointer
If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write
CVE-2022-28281
8.8 - High
- December 22, 2022
If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Memory Corruption
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape
CVE-2022-26486
9.6 - Critical
- December 22, 2022
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
Dangling pointer
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link
CVE-2022-26384
9.6 - Critical
- December 22, 2022
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
An out-of-bounds read can occur when decoding H264 video
CVE-2022-3266
5.5 - Medium
- December 22, 2022
An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Out-of-bounds Read
When receiving an HTML email
CVE-2022-3034
4.3 - Medium
- December 22, 2022
When receiving an HTML email that specified to load an <code>iframe</code> element from a remote location, a request to the remote document was sent. However, Thunderbird didn't display the document. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1.
Clickjacking
Mozilla developers Andrew McCreight
CVE-2022-29917
9.8 - Critical
- December 22, 2022
Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
assertion failure
Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables
CVE-2022-29916
6.5 - Medium
- December 22, 2022
Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12
CVE-2022-38478
8.8 - High
- December 22, 2022
Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.
Memory Corruption
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash
CVE-2022-46881
8.8 - High
- December 22, 2022
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 106, Firefox ESR < 102.6, and Thunderbird < 102.6.
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash
CVE-2022-46880
6.5 - Medium
- December 22, 2022
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.<br />*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR < 102.6, Firefox < 105, and Thunderbird < 102.6.
Dangling pointer
Cross-Site Tracing occurs when a server will echo a request back via the Trace method
CVE-2022-45411
6.1 - Medium
- December 22, 2022
Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on <code>fetch()</code> and XMLHttpRequest; however some webservers have implemented non-standard headers such as <code>X-Http-Method-Override</code> that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
XSS
Through a series of popups
CVE-2022-45408
6.5 - Medium
- December 22, 2022
Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
If an out-of-memory condition occurred when creating a JavaScript global
CVE-2022-45406
9.8 - Critical
- December 22, 2022
If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Memory Corruption
Through a series of popup and <code>window.print()</code> calls, an attacker
CVE-2022-45404
6.5 - Medium
- December 22, 2022
Through a series of popup and <code>window.print()</code> calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
An OpenPGP digital signature includes information about the date when the signature was created
CVE-2022-2226
6.5 - Medium
- December 22, 2022
An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird < 102 and Thunderbird < 91.11.
Authentication Bypass by Capture-replay
The garbage collector could have been aborted in several states and zones and <code>GCRuntime::finishCollection</code> may not have been called
CVE-2022-45409
8.8 - High
- December 22, 2022
The garbage collector could have been aborted in several states and zones and <code>GCRuntime::finishCollection</code> may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Dangling pointer
When a ServiceWorker intercepted a request with <code>FetchEvent</code>
CVE-2022-45410
6.5 - Medium
- December 22, 2022
When a ServiceWorker intercepted a request with <code>FetchEvent</code>, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
If a Thunderbird user quoted
CVE-2022-45414
8.1 - High
- December 22, 2022
If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.
Exposure of Resource to Wrong Sphere
Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses
CVE-2022-45416
6.5 - Medium
- December 22, 2022
Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Side Channel Attack
If a custom mouse cursor is specified in CSS
CVE-2022-45418
6.1 - Medium
- December 22, 2022
If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Clickjacking
Use tables inside of an iframe
CVE-2022-45420
6.5 - Medium
- December 22, 2022
Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Clickjacking
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4
CVE-2022-45421
8.8 - High
- December 22, 2022
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place
CVE-2022-46874
8.8 - High
- December 22, 2022
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.<br/>*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6.
Mozilla developers Randell Jesup
CVE-2022-46878
8.8 - High
- December 22, 2022
Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.
A use-after-free in WebGL extensions could have led to a potentially exploitable crash
CVE-2022-46882
9.8 - Critical
- December 22, 2022
A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6.
Dangling pointer
During the plaintext phase of the STARTTLS connection setup
CVE-2020-15685
8.8 - High
- December 22, 2022
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
Command Injection
When receiving an OpenPGP/MIME signed email message
CVE-2021-4126
6.5 - Medium
- December 22, 2022
When receiving an OpenPGP/MIME signed email message that contains an additional outer MIME message layer, for example a message footer added by a mailing list gateway, Thunderbird only considered the inner signed message for the signature validity. This gave the false impression that the additional contents were also covered by the digital signature. Starting with Thunderbird version 91.4.1, only the signature that belongs to the top level MIME part will be considered for the displayed status. This vulnerability affects Thunderbird < 91.4.1.
An out of date graphics library (Angle) likely contained vulnerabilities that could potentially be exploited
CVE-2021-4127
9.8 - Critical
- December 22, 2022
An out of date graphics library (Angle) likely contained vulnerabilities that could potentially be exploited. This vulnerability affects Thunderbird < 78.9 and Firefox ESR < 78.9.
Mozilla developers and community members Julian Hector
CVE-2021-4129
9.8 - Critical
- December 22, 2022
Mozilla developers and community members Julian Hector, Randell Jesup, Gabriele Svelto, Tyson Smith, Christian Holler, and Masayuki Nakano reported memory safety bugs present in Firefox 94. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 95, Firefox ESR < 91.4.0, and Thunderbird < 91.4.0.
It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox
CVE-2021-4140
10 - Critical
- December 22, 2022
It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
aka Blind XPath Injection
An improper implementation of the new iframe sandbox keyword <code>
CVE-2022-29911
6.1 - Medium
- December 22, 2022
An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Clickjacking
Requests initiated through reader mode did not properly omit cookies with a SameSite attribute
CVE-2022-29912
6.1 - Medium
- December 22, 2022
Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Open Redirect
The parent process would not properly check whether the Speech Synthesis feature is enabled, when receiving instructions
CVE-2022-29913
6.5 - Medium
- December 22, 2022
The parent process would not properly check whether the Speech Synthesis feature is enabled, when receiving instructions from a child process. This vulnerability affects Thunderbird < 91.9.
When reusing existing popups Firefox would have
CVE-2022-29914
6.5 - Medium
- December 22, 2022
When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
If an object prototype was corrupted by an attacker, they
CVE-2022-2200
8.8 - High
- December 22, 2022
If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Prototype Pollution
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102
CVE-2022-2505
8.8 - High
- December 22, 2022
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1.
Memory Corruption
A malicious website could have learned the size of a cross-origin resource that supported Range requests
CVE-2022-31736
9.8 - Critical
- December 22, 2022
A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash
CVE-2022-31737
9.8 - Critical
- December 22, 2022
A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Memory Corruption
When exiting fullscreen mode
CVE-2022-31738
6.5 - Medium
- December 22, 2022
When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Authentication Bypass by Spoofing
On arm64
CVE-2022-31740
8.8 - High
- December 22, 2022
On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
An attacker could have exploited a timing attack by sending a large number of
CVE-2022-31742
6.5 - Medium
- December 22, 2022
An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Freeing arbitrary <code>nsIInputStream</code>'s on a different thread than creation could have led to a use-after-free and potentially exploitable crash
CVE-2022-45405
6.5 - Medium
- December 22, 2022
Freeing arbitrary <code>nsIInputStream</code>'s on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Dangling pointer
Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have
CVE-2022-45403
6.5 - Medium
- December 22, 2022
Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Side Channel Attack
Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.3
CVE-2022-42932
8.8 - High
- December 22, 2022
Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
If a website called <code>window.print()</code> in a particular way, it could cause a denial of service of the browser
CVE-2022-42929
6.5 - Medium
- December 22, 2022
If a website called <code>window.print()</code> in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
Certain types of allocations were missing annotations
CVE-2022-42928
8.8 - High
- December 22, 2022
Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
A same-origin policy violation could have
CVE-2022-42927
8.1 - High
- December 22, 2022
A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via <code>performance.getEntries()</code>. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
Origin Validation Error
Mozilla developers Nika Layzell
CVE-2022-40962
8.8 - High
- December 22, 2022
Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Concurrent use of the URL parser with non-UTF-8 data was not thread-safe
CVE-2022-40960
6.5 - Medium
- December 22, 2022
Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Dangling pointer
During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass
CVE-2022-40959
6.5 - Medium
- December 22, 2022
During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Insecure Storage of Sensitive Information
By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies
CVE-2022-40958
6.5 - Medium
- December 22, 2022
By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Injection
Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash
CVE-2022-40957
6.5 - Medium
- December 22, 2022
Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.<br>*This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to
CVE-2022-3033
8.1 - High
- December 22, 2022
If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn't affect users who have changed the default Message Body display setting to 'simple html' or 'plain text'. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1.
Code Injection
An attacker could have injected CSS into stylesheets accessible
CVE-2022-31744
6.5 - Medium
- December 22, 2022
An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR < 91.11, Thunderbird < 102, Thunderbird < 91.11, and Firefox < 101.
AuthZ
If there was a PAC URL set and the server
CVE-2022-34472
4.3 - Medium
- December 22, 2022
If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Session history navigations may have led to a use-after-free and potentially exploitable crash
CVE-2022-34470
9.8 - Critical
- December 22, 2022
Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Dangling pointer
Mozilla developers Andrew McCreight, Nicolas B
CVE-2022-31747
9.8 - Critical
- December 22, 2022
Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1
CVE-2022-38477
8.8 - High
- December 22, 2022
Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.2, Thunderbird < 102.2, and Firefox < 104.
Memory Corruption
A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption
CVE-2022-31741
8.8 - High
- December 22, 2022
A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Buffer Overflow
When receiving an HTML email
CVE-2022-3032
6.5 - Medium
- December 22, 2022
When receiving an HTML email that contained an <code>iframe</code> element, which used a <code>srcdoc</code> attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1.
AuthZ
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Mozilla Thunderbird or by Mozilla? Click the Watch button to subscribe.
