Mozilla Foundation Security Advisory 2024-58

Security Vulnerabilities fixed in Thunderbird 128.4

Announced
October 29, 2024
Impact
high
Products
Thunderbird
Fixed in
  • Thunderbird 128.4

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

#CVE-2024-10458: Permission leak via embed or object elements

Reporter
James Lee
Impact
high
Description

A permission leak could have occurred from a trusted site to an untrusted site via embed or object elements.

References

#CVE-2024-10459: Use-after-free in layout with accessibility

Reporter
Tyson Smith
Impact
high
Description

An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash.

References

#CVE-2024-10460: Confusing display of origin for external protocol handler prompt

Reporter
Shaheen Fazim
Impact
moderate
Description

The origin of an external protocol handler prompt could have been obscured using a data: URL within an iframe.

References

#CVE-2024-10461: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response

Reporter
Masato Kinugawa
Impact
moderate
Description

In multipart/x-mixed-replace responses, Content-Disposition: attachment in the response header was not respected and did not force a download, which could allow XSS attacks.

References

#CVE-2024-10462: Origin of permission prompt could be spoofed by long URL

Reporter
Hafiizh
Impact
moderate
Description

Truncation of a long URL could have allowed origin spoofing in a permission prompt.

References

#CVE-2024-10463: Cross origin video frame leak

Reporter
Karl Tomlinson
Impact
moderate
Description

Video frames could have been leaked between origins in some situations.

References

#CVE-2024-10464: History interface could have been used to cause a Denial of Service condition in the browser

Reporter
Andrei Enache
Impact
low
Description

Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API.

References

#CVE-2024-10465: Clipboard "paste" button persisted across tabs

Reporter
Kang Ali and Nur Fadhillah of Punggawa Cybersecurity
Impact
low
Description

A clipboard "paste" button could persist across tabs which allowed a spoofing attack.

References

#CVE-2024-10466: DOM push subscription message could hang Firefox

Reporter
Kagami Rosylight
Impact
low
Description

By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive.

References

#CVE-2024-10467: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4

Reporter
Andrew McCreight, the Mozilla Fuzzing Team
Impact
moderate
Description

Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References