CVE-2023-50762Improper Verification of Cryptographic Signature in Mozilla Thunderbird

Severity
4.3MEDIUMNVD
EPSS
0.2%
top 59.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 19
Latest updateJan 2

Description

When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

CVEListV5mozilla/thunderbirdunspecified115.6
NVDmozilla/thunderbird< 115.6
Debianmozilla/thunderbird< 1:115.6.0-1~deb11u1+3
Ubuntumozilla/thunderbird< 1:115.6.0+build2-0ubuntu0.20.04.1+1

Also affects: Debian Linux 11.0, 12.0

🔴Vulnerability Details

4
OSV
thunderbird vulnerabilities2024-01-02
GHSA
GHSA-63rr-fhmr-42fq: When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user2023-12-19
OSV
CVE-2023-50762: When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user2023-12-19
CVEList
CVE-2023-50762: When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user2023-12-19

📋Vendor Advisories

4
Ubuntu
Thunderbird vulnerabilities2024-01-02
Red Hat
Mozilla: Truncated signed text was shown with a valid OpenPGP signature2023-12-19
Debian
CVE-2023-50762: thunderbird - When processing a PGP/MIME payload that contains digitally signed text, the firs...2023
Mozilla
Mozilla Foundation Security Advisory 2023-55: CVE-2023-50762
CVE-2023-50762 — Mozilla Thunderbird vulnerability | cvebase