Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-0430

Опубликовано: 02 июн. 2023
Источник: debian
EPSS Низкий

Описание

Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
thunderbirdfixed1:102.7.1+1-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-04/#CVE-2023-0430

  • https://bugzilla.mozilla.org/show_bug.cgi?id=1769000

EPSS

Процентиль: 22%
0.00071
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 2 лет назад

Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1.

CVSS3: 7.5
redhat
больше 2 лет назад

Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1.

CVSS3: 6.5
nvd
около 2 лет назад

Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1.

rocky
больше 2 лет назад

Important: thunderbird security update

rocky
больше 2 лет назад

Important: thunderbird security update

EPSS

Процентиль: 22%
0.00071
Низкий