Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-45414

Опубликовано: 22 дек. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.1

Описание

If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.

РелизСтатусПримечание
bionic

released

1:102.7.1+build2-0ubuntu0.18.04.1
devel

released

1:102.7.1+build2-0ubuntu1
esm-infra/focal

DNE

focal

released

1:102.7.1+build2-0ubuntu0.20.04.1
jammy

released

1:102.7.1+build2-0ubuntu0.22.04.1
kinetic

released

1:102.7.1+build2-0ubuntu0.22.10.1
lunar

released

1:102.7.1+build2-0ubuntu1
trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

EPSS

Процентиль: 38%
0.00162
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
больше 2 лет назад

If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.

CVSS3: 8.1
nvd
больше 2 лет назад

If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.

CVSS3: 8.1
debian
больше 2 лет назад

If a Thunderbird user quoted from an HTML email, for example by replyi ...

suse-cvrf
больше 2 лет назад

Security update for MozillaThunderbird

CVSS3: 8.1
github
больше 2 лет назад

If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.

EPSS

Процентиль: 38%
0.00162
Низкий

8.1 High

CVSS3