![]() Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. (CVE-2022-31741) - When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. (CVE-2022-31740) - A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. (CVE-2022-31739) - On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This bug only affects Thunderbird for Windows. (CVE-2022-31738) - When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%. (CVE-2022-31737) - When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. (CVE-2022-31736) - A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. A malicious website could have learned the size of a cross-origin resource that supported Range requests. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2022-22 advisory. Description The version of Thunderbird installed on the remote macOS or Mac OS X host is prior to 91.10. Synopsis A mail client installed on the remote macOS or Mac OS X host is affected by multiple vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |