=====================================================================

                                 CERT-Renater

                       Note d'Information No. 2023/VULN441

_____________________________________________________________________

DATE                : 26/10/2023

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Thunderbird versions prior to
                                        115.4.1.

=====================================================================
https://www.mozilla.org/en-US/security/advisories/mfsa2023-47/
_____________________________________________________________________


Mozilla Foundation Security Advisory 2023-47
Security Vulnerabilities fixed in Thunderbird 115.4.1

Announced        October 24, 2023
Impact           high
Products         Thunderbird
Fixed in
         Thunderbird 115.4.1

In general, these flaws cannot be exploited through email in the
Thunderbird product because scripting is disabled when reading mail,
but are potentially risks in browser or browser-like contexts.


#CVE-2023-5721: Queued up rendering could have allowed websites to
clickjack

Reporter        Kelsey Gilbert
Impact          high

Description

It was possible for certain browser prompts and dialogs to be
activated or dismissed unintentionally by the user due to an
insufficient activation-delay.

References

     Bug 1830820


#CVE-2023-5732: Address bar spoofing via bidirectional characters

Reporter        Armin Ebert
Impact          moderate

Description

An attacker could have created a malicious link using bidirectional
characters to spoof the location in the address bar when visited.

References

     Bug 1690979
     Bug 1836962


#CVE-2023-5724: Large WebGL draw could have led to a crash

Reporter        pwn2car
Impact          moderate

Description

Drivers are not always robust to extremely large draw calls and
in some cases this scenario could have led to a crash.

References

     Bug 1836705


#CVE-2023-5725: WebExtensions could open arbitrary URLs

Reporter        Shaheen Fazim
Impact          moderate

Description

A malicious installed WebExtension could open arbitrary URLs,
which under the right circumstance could be leveraged to collect
sensitive user data.

References

     Bug 1845739


#CVE-2023-5726: Full screen notification obscured by file open
dialog on macOS

Reporter        Edgar Chen and Hafiizh
Impact          moderate

Description

A website could have obscured the full screen notification by
using the file open dialog. This could have led to user
confusion and possible spoofing attacks.
Note: This issue only affected macOS operating systems. Other
operating systems are unaffected.

References

     Bug 1846205

#CVE-2023-5727: Download Protections were bypassed by .msix,
.msixbundle, .appx, and .appxbundle files on Windows

Reporter        Marco Bonardo
Impact          moderate

Description

The executable file warning was not presented when downloading
.msix, .msixbundle, .appx, and .appxbundle files, which can run
commands on a user's computer.
Note: This issue only affected Windows operating systems. Other
operating systems are unaffected.

References

     Bug 1847180

#CVE-2023-5728: Improper object tracking during GC in the
JavaScript engine could have led to a crash.

Reporter        anbu
Impact          moderate

Description

During garbage collection extra operations were performed on
a object that should not be. This could have led to a
potentially exploitable crash.

References

     Bug 1852729


#CVE-2023-5730: Memory safety bugs fixed in Firefox 119,
Firefox ESR 115.4, and Thunderbird 115.4.1

Reporter        Randell Jesup, Andrew McCreight, Jed Davis,
and the Mozilla Fuzzing Team

Impact           high

Description

Memory safety bugs present in Firefox 118, Firefox ESR 115.3,
and Thunderbird 115.3. Some of these bugs showed evidence of
memory corruption and we presume that with enough effort some
of these could have been exploited to run arbitrary code.

References

     Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4,
and Thunderbird 115.4.1



=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
