CVE-2020-26970
Published: 9 December 2020
When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.
Priority
Status
Package | Release | Status |
---|---|---|
thunderbird Launchpad, Ubuntu, Debian |
bionic |
Released
(1:78.8.1+build1-0ubuntu0.18.04.1)
|
focal |
Released
(1:78.7.1+build1-0ubuntu0.20.04.1)
|
|
groovy |
Released
(1:78.6.1+build1-0ubuntu0.20.10.1)
|
|
hirsute |
Released
(1:78.5.1+build1-0ubuntu1)
|
|
impish |
Released
(1:78.5.1+build1-0ubuntu1)
|
|
jammy |
Released
(1:78.5.1+build1-0ubuntu1)
|
|
kinetic |
Released
(1:78.5.1+build1-0ubuntu1)
|
|
lunar |
Released
(1:78.5.1+build1-0ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(78.5.1)
|
|
xenial |
Ignored
(end of standard support, was needs-triage)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26970
- https://www.mozilla.org/en-US/security/advisories/mfsa2020-53/#CVE-2020-26970
- https://www.mozilla.org/en-US/security/advisories/mfsa2020-53/#CVE-2020-26970
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677338
- https://ubuntu.com/security/notices/USN-4701-1
- NVD
- Launchpad
- Debian