Mozilla Foundation Security Advisory 2022-32

Security Vulnerabilities fixed in Thunderbird 102.1

Announced
July 28, 2022
Impact
moderate
Products
Thunderbird
Fixed in
  • Thunderbird 102.1

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

#CVE-2022-36319: Mouse Position spoofing with CSS transforms

Reporter
Irvan Kurniawan
Impact
moderate
Description

When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed.

References

#CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters

Reporter
Gijs Kruitbosch
Impact
moderate
Description

When visiting directory listings for chrome:// URLs as source text, some parameters were reflected.

References

#CVE-2022-36314: Opening local ".lnk" files could cause unexpected network loads

Reporter
akucybersec
Impact
moderate
Description

When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.
This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*

References

#CVE-2022-2505: Memory safety bugs fixed in Thunderbird 102.1

Reporter
Mozilla developers and community
Impact
high
Description

Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References