Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3875

Опубликовано: 14 мая 2025
Источник: redhat
CVSS3: 7.5

Описание

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

The Mozilla Foundation's Security Advisory describes the following issue: Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name spoofed@example.com legitimate@example.com", Thunderbird treats spoofed@example.com as the actual address.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10rhel10/thunderbird-flatpakAffected
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7thunderbirdOut of support scope
Red Hat Enterprise Linux 10thunderbirdFixedRHSA-2025:819627.05.2025
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2025:875610.06.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2025:839102.06.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportthunderbirdFixedRHSA-2025:850704.06.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportthunderbirdFixedRHSA-2025:859405.06.2025
Red Hat Enterprise Linux 8.6 Telecommunications Update ServicethunderbirdFixedRHSA-2025:859405.06.2025
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsthunderbirdFixedRHSA-2025:859405.06.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-290
https://bugzilla.redhat.com/show_bug.cgi?id=2366287thunderbird: Sender Spoofing via Malformed From Header in Thunderbird

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
nvd
около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
debian
около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing i ...

CVSS3: 7.5
github
около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
fstec
4 месяца назад

Уязвимость почтового клиента Thunderbird, связанная с некорректной обработкой заголовка p2-from, позволяющая нарушителю проводить спуфинг атаки

7.5 High

CVSS3