Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-26695

Опубликовано: 10 мар. 2025
Источник: debian
EPSS Низкий

Описание

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
thunderbirdfixed1:128.8.0esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-18/#CVE-2025-26695

EPSS

Процентиль: 6%
0.00028
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
5 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 4.3
redhat
5 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
nvd
5 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
github
5 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
fstec
6 месяцев назад

Уязвимость почтового клиента Thunderbird, связанная с некорректным импортом ключа OpenPGP с сервера WKD, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 6%
0.00028
Низкий