CVE-2023-50762
Publication date 20 December 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.
Status
Package | Ubuntu Release | Status |
---|---|---|
thunderbird | ||
22.04 LTS jammy |
Fixed 1:115.6.0+build2-0ubuntu0.22.04.1
|
|
20.04 LTS focal |
Fixed 1:115.6.0+build2-0ubuntu0.20.04.1
|
|
18.04 LTS bionic | Ignored end of standard support | |
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-6563-1
- Thunderbird vulnerabilities
- 2 January 2024