Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-50762

Опубликовано: 19 дек. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

The Mozilla Foundation Security Advisory: When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2024:002702.01.2024
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2024:000302.01.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2024:003002.01.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update ServicethunderbirdFixedRHSA-2024:003002.01.2024
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionsthunderbirdFixedRHSA-2024:003002.01.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportthunderbirdFixedRHSA-2024:002802.01.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicethunderbirdFixedRHSA-2024:002802.01.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsthunderbirdFixedRHSA-2024:002802.01.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportthunderbirdFixedRHSA-2024:000502.01.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-347
https://bugzilla.redhat.com/show_bug.cgi?id=2255379Mozilla: Truncated signed text was shown with a valid OpenPGP signature

EPSS

Процентиль: 52%
0.00288
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 1 года назад

When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVSS3: 4.3
nvd
больше 1 года назад

When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVSS3: 4.3
debian
больше 1 года назад

When processing a PGP/MIME payload that contains digitally signed text ...

CVSS3: 4.3
github
больше 1 года назад

When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость почтового клиента Thunderbird, связанная с ошибками обработки криптографической подписи OpenPGP, позволяющая нарушителю осуществить спуфинг-атаку

EPSS

Процентиль: 52%
0.00288
Низкий

7.5 High

CVSS3