Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value Spoofed Name , Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Thunderbird | Mozilla | * | 128.10.0 (excluding) |
Thunderbird | Mozilla | 129.0 (including) | 138.0.1 (excluding) |
Red Hat Enterprise Linux 10 | RedHat | thunderbird-0:128.10.1-1.el10_0 | * |
Red Hat Enterprise Linux 8 | RedHat | thunderbird-0:128.11.0-1.el8_10 | * |
Red Hat Enterprise Linux 8.2 Advanced Update Support | RedHat | thunderbird-0:128.10.1-1.el8_2 | * |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | RedHat | thunderbird-0:128.10.1-1.el8_4 | * |
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | RedHat | thunderbird-0:128.10.1-1.el8_6 | * |
Red Hat Enterprise Linux 8.6 Telecommunications Update Service | RedHat | thunderbird-0:128.10.1-1.el8_6 | * |
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions | RedHat | thunderbird-0:128.10.1-1.el8_6 | * |
Red Hat Enterprise Linux 8.8 Telecommunications Update Service | RedHat | thunderbird-0:128.10.1-1.el8_8 | * |
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions | RedHat | thunderbird-0:128.10.1-1.el8_8 | * |
Red Hat Enterprise Linux 9 | RedHat | thunderbird-0:128.10.1-1.el9_6 | * |
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | RedHat | thunderbird-0:128.10.1-1.el9_0 | * |
Red Hat Enterprise Linux 9.2 Extended Update Support | RedHat | thunderbird-0:128.10.1-1.el9_2 | * |
Red Hat Enterprise Linux 9.4 Extended Update Support | RedHat | thunderbird-0:128.10.1-1.el9_4 | * |
Thunderbird | Ubuntu | focal | * |