Mozilla.Thunderbird.WYSIWIG.Engine.IFRAME.JavaScript.Execution

description-logoDescription

This indicates an attempt to exploit a Security Bypass vulnerability in Mozilla Thunderbird 1.0.7.
The vulnerability in the WYSIWYG rendering engine ("rich mail" editor) allows user assisted attackers to bypass javascript security settings and obtain sensitive information, or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

affected-products-logoAffected Products

Mozilla Thunderbird 1.0.7 and earlier.

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information.
Denial of Service: Remote attackers can crash the application.

recomended-action-logoRecommended Actions

Upgrade to version 1.5 ot newer.
Download page:
http://www.mozilla.com/thunderbird/all.html
Direct link:
http://ftp.mozilla.org/pub/mozilla.org/thunderbird/releases/1.5/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-07-09 14.645 Sig Added