CVE-2024-1936
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/03/2024
Last modified:
30/06/2025
Description
The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third-party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* | 115.8.1 (excluding) | |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugzilla.mozilla.org/show_bug.cgi?id=1860977
- https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
- https://www.mozilla.org/security/advisories/mfsa2024-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1860977
- https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
- https://www.mozilla.org/security/advisories/mfsa2024-11/