Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2022.0061
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2022-0061)
Summary:The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2022-0061 advisory.
Description:Summary:
The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2022-0061 advisory.

Vulnerability Insight:
If a user installed an extension of a particular type, the extension could
have auto-updated itself and while doing so, bypass the prompt which grants
the new version the new requested permissions (CVE-2022-22754).

If a user was convinced to drag and drop an image to their desktop or other
folder, the resulting object could have been changed into an executable script
which would have run arbitrary code after the user clicked on it
(CVE-2022-22756).

If a document created a sandboxed iframe without allow-scripts, and
subsequently appended an element to the iframe's document that e.g. had a
JavaScript event handler - the event handler would have run despite the
iframe's sandbox (CVE-2022-22759).

When importing resources using Web Workers, error messages would distinguish
the difference between application/javascript responses and non-script
responses. This could have been abused to learn information cross-origin
(CVE-2022-22760).

Web-accessible extension pages (pages with a moz-extension:// scheme) were not
correctly enforcing the frame-ancestors directive when it was used in the Web
Extension's Content Security Policy (CVE-2022-22761).

When a worker is shutdown, it was possible to cause script to run late in the
lifecycle, at a point after where it should not be possible (CVE-2022-22763).

Mozilla developers and community members Paul Adenot and the Mozilla Fuzzing
Team reported memory safety bugs present in Thunderbird 91.5. Some of these
bugs showed evidence of memory corruption and we presume that with enough
effort some of these could have been exploited to run arbitrary code
(CVE-2022-22764).

Affected Software/OS:
'thunderbird, thunderbird-l10n' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-22754
https://bugzilla.mozilla.org/show_bug.cgi?id=1750565
https://www.mozilla.org/security/advisories/mfsa2022-04/
https://www.mozilla.org/security/advisories/mfsa2022-05/
https://www.mozilla.org/security/advisories/mfsa2022-06/
Common Vulnerability Exposure (CVE) ID: CVE-2022-22756
https://bugzilla.mozilla.org/show_bug.cgi?id=1317873
Common Vulnerability Exposure (CVE) ID: CVE-2022-22759
https://bugzilla.mozilla.org/show_bug.cgi?id=1739957
Common Vulnerability Exposure (CVE) ID: CVE-2022-22760
https://bugzilla.mozilla.org/show_bug.cgi?id=1740985
https://bugzilla.mozilla.org/show_bug.cgi?id=1748503
Common Vulnerability Exposure (CVE) ID: CVE-2022-22761
https://bugzilla.mozilla.org/show_bug.cgi?id=1745566
Common Vulnerability Exposure (CVE) ID: CVE-2022-22763
https://bugzilla.mozilla.org/show_bug.cgi?id=1740534
https://www.mozilla.org/security/advisories/mfsa2022-01/
Common Vulnerability Exposure (CVE) ID: CVE-2022-22764
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1742682%2C1744165%2C1746545%2C1748210%2C1748279
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.