If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Thunderbird | Mozilla | * | 102.5.1 (excluding) |
Thunderbird | Ubuntu | bionic | * |
Thunderbird | Ubuntu | devel | * |
Thunderbird | Ubuntu | focal | * |
Thunderbird | Ubuntu | jammy | * |
Thunderbird | Ubuntu | kinetic | * |
Thunderbird | Ubuntu | lunar | * |
Thunderbird | Ubuntu | trusty | * |
Thunderbird | Ubuntu | xenial | * |
Red Hat Enterprise Linux 7 | RedHat | thunderbird-0:102.6.0-2.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | thunderbird-0:102.6.0-2.el8_7 | * |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | RedHat | thunderbird-0:102.6.0-2.el8_1 | * |
Red Hat Enterprise Linux 8.2 Advanced Update Support | RedHat | thunderbird-0:102.6.0-2.el8_2 | * |
Red Hat Enterprise Linux 8.2 Telecommunications Update Service | RedHat | thunderbird-0:102.6.0-2.el8_2 | * |
Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions | RedHat | thunderbird-0:102.6.0-2.el8_2 | * |
Red Hat Enterprise Linux 8.4 Extended Update Support | RedHat | thunderbird-0:102.6.0-2.el8_4 | * |
Red Hat Enterprise Linux 8.6 Extended Update Support | RedHat | thunderbird-0:102.6.0-2.el8_6 | * |
Red Hat Enterprise Linux 9 | RedHat | thunderbird-0:102.6.0-2.el9_1 | * |
Red Hat Enterprise Linux 9.0 Extended Update Support | RedHat | thunderbird-0:102.6.0-2.el9_0 | * |