Download Firefox

Firefox is no longer supported on Windows 8.1 and below.

Please download Firefox ESR (Extended Support Release) to use Firefox.

Firefox is no longer supported on macOS 10.14 and below.

Please download Firefox ESR (Extended Support Release) to use Firefox.

Firefox Privacy Notice

Mozilla Foundation Security Advisory 2024-67

Security Vulnerabilities fixed in Thunderbird 133

Announced
November 26, 2024
Impact
high
Products
Thunderbird
Fixed in
  • Thunderbird 133

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

#CVE-2024-11691: Out-of-bounds write in Apple GPU drivers via WebGL

Reporter
Dohyun Lee (@l33d0hyun) of USELab, Korea University & Youngho Choi of CEL, Korea University & Geumhwan Cho of USELab, Korea University
Impact
high
Description

Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver.
This bug only affected the application on Apple M series hardware. Other platforms were unaffected.

References

#CVE-2024-11700: Potential Tapjacking Exploit for Intent Confirmation on Android

Reporter
Shaheen Fazim
Impact
moderate
Description

Malicious websites may have been able to user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities.

References

#CVE-2024-11692: Select list elements could be shown over another site

Reporter
Shaheen Fazim
Impact
moderate
Description

An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks.

References

#CVE-2024-11701: Misleading Address Bar State During Navigation Interruption

Reporter
Daniel Holbert
Impact
moderate
Description

The incorrect domain may have been displayed in the address bar during an interrupted navigation attempt. This could have led to user confusion and possible spoofing attacks.

References

#CVE-2024-11702: Inadequate Clipboard Protection in Private Browsing Mode on Android

Reporter
Umar Farooq
Impact
moderate
Description

Copying sensitive information from Private Browsing tabs on Android, such as passwords, may have inadvertently stored data in the cloud-based clipboard history if enabled.

References

#CVE-2024-11693: Download Protections were bypassed by .library-ms files on Windows

Reporter
Marco Bonardo
Impact
moderate
Description

The executable file warning was not presented when downloading .library-ms files.
Note: This issue only affected Windows operating systems. Other operating systems are unaffected.

References

#CVE-2024-11694: CSP Bypass and XSS Exposure via Web Compatibility Shims

Reporter
Masato Kinugawa
Impact
moderate
Description

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP frame-src bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content.

References

#CVE-2024-11695: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters

Reporter
Renwa Hiwa
Impact
moderate
Description

A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack.

References

#CVE-2024-11696: Unhandled Exception in Add-on Signature Verification

Reporter
Rob Wu
Impact
moderate
Description

The application failed to account for exceptions thrown by the loadManifestFromFile method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue.

References

#CVE-2024-11697: Improper Keypress Handling in Executable File Confirmation Dialog

Reporter
Umar Farooq
Impact
low
Description

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution.

References

#CVE-2024-11704: Potential Double-Free Vulnerability in PKCS#7 Decryption Handling

Reporter
Ronald Crane
Impact
low
Description

A double-free issue could have occurred in sec_pkcs7_decoder_start_decrypt() when handling an error path. Under specific conditions, the same symmetric key could have been freed twice, potentially leading to memory corruption.

References

#CVE-2024-11698: Fullscreen Lock-Up When Modal Dialog Interrupts Transition on macOS

Reporter
Kang Ali of Punggawa Cybersecurity
Impact
low
Description

A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted.
This bug only affects the application when running on macOS. Other operating systems are unaffected.

References

#CVE-2024-11705: Null Pointer Dereference in NSC_DeriveKey

Reporter
coffeys
Impact
low
Description

NSC_DeriveKey inadvertently assumed that the phKey parameter is always non-NULL. When it was passed as NULL, a segmentation fault (SEGV) occurred, leading to crashes. This behavior conflicted with the PKCS#11 v3.0 specification, which allows phKey to be NULL for certain mechanisms.

References

#CVE-2024-11706: Null Pointer Dereference in PKCS#12 Utility

Reporter
Marc Schoenefeld
Impact
low
Description

A null pointer dereference may have inadvertently occurred in pk12util, and specifically in the SEC_ASN1DecodeItem_Util function, when handling malformed or improperly formatted input files.

References

#CVE-2024-11708: Data race with PlaybackParams

Reporter
Serban Stanca
Impact
low
Description

Missing thread synchronization primitives could have led to a data race on members of the PlaybackParams structure.

References

#CVE-2024-11699: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5

Reporter
Andrew McCreight, Akmat Suleimanov
Impact
high
Description

Memory safety bugs present in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References