RSS fields can inject new lines into the created email structure, modifying the message body. This vulnerability affects Thunderbird < 52.5.2.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla thunderbird |
||
redhat enterprise linux 6.0 |
||
redhat enterprise linux server eus 7.5 |
||
redhat enterprise linux server eus 7.3 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux server eus 7.4 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux 7.0 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux server aus 7.3 |
||
debian debian linux 9.0 |
||
debian debian linux 7.0 |
||
debian debian linux 8.0 |
Mozilla issued a critical security update to its popular open-source Thunderbird email client. The patch was part of a December release of five fixes that included two bugs rated high and one rated moderate and another low.
Mozilla said Thunderbird, which is also serves as a news, RSS and chat client, the latest Thunderbird 52.5.2 version released last week fixes the vulnerabilities.
The most serious of the fixes is a critical buffer overflow bug (CVE-2017-7845) impacting Thunderbird...