Mozilla Foundation Security Advisory 2022-32
Security Vulnerabilities fixed in Thunderbird 102.1
- Announced
- July 28, 2022
- Impact
- moderate
- Products
- Thunderbird
- Fixed in
-
- Thunderbird 102.1
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
#CVE-2022-36319: Mouse Position spoofing with CSS transforms
- Reporter
- Irvan Kurniawan
- Impact
- moderate
Description
When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed.
References
#CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters
- Reporter
- Gijs Kruitbosch
- Impact
- moderate
Description
When visiting directory listings for chrome://
URLs as source text, some parameters were reflected.
References
#CVE-2022-36314: Opening local ".lnk" files could cause unexpected network loads
- Reporter
- akucybersec
- Impact
- moderate
Description
When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.
This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*
References
#CVE-2022-2505: Memory safety bugs fixed in Thunderbird 102.1
- Reporter
- Mozilla developers and community
- Impact
- high
Description
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.