Mozilla Thunderbird SMTP Server Stack-Based Buffer Overflow Vulnerability

Bug #1906609 reported by it0001
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
thunderbird (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

A vulnerability has been reported in Mozilla Thunderbird, which can be exploited by malicious people to compromise a vulnerable system.

An error when parsing SMTP server status codes can be exploited to cause a stack-based buffer overflow.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is reported in versions prior to 78.5.1.

Affected Software

The following software is affected by the described vulnerability. Please check the vendor links below to see if exactly your version is affected.

Mozilla Thunderbird 78.x

Solution

Update to version 78.5.1.

References

1. https://www.mozilla.org/en-US/security/advisories/mfsa2020-53/ <https://www.mozilla.org/en-US/security/advisories/mfsa2020-53/>

information type: Private Security → Public Security
Changed in thunderbird (Ubuntu):
status: New → Confirmed
Revision history for this message
Olivier Tilloy (osomon) wrote :

78.5.1 is in hirsute, and in the process of being SRUed to other supported releases.

Changed in thunderbird (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.