Vulnerability CVE-2018-12374: Information

Description

Plaintext of decrypted emails can leak through by user submitting an embedded form by pressing enter key within a text input field. This vulnerability affects Thunderbird < 52.9.

Severity: MEDIUM (4.3) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Published: Oct. 18, 2018
Modified: Oct. 3, 2019
Error type identifier: CWE-200

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
thunderbirdsisyphus52.9.0-alt1115.9.0-alt1ALT-PU-2018-1978-1209483Fixed
thunderbirdp1052.9.0-alt1115.9.0-alt1ALT-PU-2018-1978-1209483Fixed
thunderbirdp952.9.0-alt1102.11.0-alt0.c9.1ALT-PU-2018-1978-1209483Fixed
thunderbirdp852.9.0-alt0.M80P.160.8.0-alt0.M80P.1ALT-PU-2018-1988-1209501Fixed
thunderbirdc10f152.9.0-alt1115.9.0-alt0.c10.1ALT-PU-2018-1978-1209483Fixed
thunderbirdc9f252.9.0-alt1102.11.0-alt0.c9.1ALT-PU-2018-1978-1209483Fixed
thunderbirdc760.8.0-alt0.M70C.160.8.0-alt0.M70C.1ALT-PU-2019-2345-1234994Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.mozilla.org/security/advisories/mfsa2018-18/
  • Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1462910
  • Issue Tracking
  • Permissions Required
  • Vendor Advisory
DSA-4244
  • Third Party Advisory
USN-3714-1
  • Third Party Advisory
[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
  • Patch
  • Third Party Advisory
RHSA-2018:2252
  • Mailing List
  • Third Party Advisory
RHSA-2018:2251
  • Third Party Advisory
104613
  • Third Party Advisory
  • VDB Entry
GLSA-201811-13
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
      End excliding
      52.9.0

      Configuration 2

      cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*