Mozilla Foundation Security Advisory 2024-59
Security Vulnerabilities fixed in Thunderbird 132
- Announced
- October 29, 2024
- Impact
- high
- Products
- Thunderbird
- Fixed in
-
- Thunderbird 132
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
#CVE-2024-10458: Permission leak via embed or object elements
- Reporter
- James Lee
- Impact
- high
Description
A permission leak could have occurred from a trusted site to an untrusted site via embed
or object
elements.
References
#CVE-2024-10459: Use-after-free in layout with accessibility
- Reporter
- Tyson Smith
- Impact
- high
Description
An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash.
References
#CVE-2024-10460: Confusing display of origin for external protocol handler prompt
- Reporter
- Shaheen Fazim
- Impact
- moderate
Description
The origin of an external protocol handler prompt could have been obscured using a data: URL within an iframe
.
References
#CVE-2024-10461: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response
- Reporter
- Masato Kinugawa
- Impact
- moderate
Description
In multipart/x-mixed-replace responses, Content-Disposition: attachment
in the response header was not respected and did not force a download, which could allow XSS attacks.
References
#CVE-2024-10462: Origin of permission prompt could be spoofed by long URL
- Reporter
- Hafiizh
- Impact
- moderate
Description
Truncation of a long URL could have allowed origin spoofing in a permission prompt.
References
#CVE-2024-10463: Cross origin video frame leak
- Reporter
- Karl Tomlinson
- Impact
- moderate
Description
Video frames could have been leaked between origins in some situations.
References
#CVE-2024-10468: Race conditions in IndexedDB
- Reporter
- Tyson Smith
- Impact
- moderate
Description
Potential race conditions in IndexedDB could have caused memory corruption, leading to a potentially exploitable crash.
References
#CVE-2024-10464: History interface could have been used to cause a Denial of Service condition in the browser
- Reporter
- Andrei Enache
- Impact
- low
Description
Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API.
References
#CVE-2024-10465: Clipboard "paste" button persisted across tabs
- Reporter
- Kang Ali and Nur Fadhillah of Punggawa Cybersecurity
- Impact
- low
Description
A clipboard "paste" button could persist across tabs which allowed a spoofing attack.
References
#CVE-2024-10466: DOM push subscription message could hang Thunderbird
- Reporter
- Kagami Rosylight
- Impact
- low
Description
By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive.
References
#CVE-2024-10467: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
- Reporter
- Andrew McCreight, the Mozilla Fuzzing Team
- Impact
- moderate
Description
Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.