CVE-2021-23992
Published: 13 April 2021
Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.
Priority
Status
Package | Release | Status |
---|---|---|
thunderbird Launchpad, Ubuntu, Debian |
bionic |
Released
(1:78.11.0+build1-0ubuntu0.18.04.2)
|
focal |
Released
(1:78.11.0+build1-0ubuntu0.20.04.2)
|
|
groovy |
Released
(1:78.11.0+build1-0ubuntu0.20.10.2)
|
|
hirsute |
Released
(1:78.11.0+build1-0ubuntu0.21.04.2)
|
|
impish |
Released
(1:78.11.0+build1-0ubuntu2)
|
|
jammy |
Released
(1:78.11.0+build1-0ubuntu2)
|
|
kinetic |
Released
(1:78.11.0+build1-0ubuntu2)
|
|
lunar |
Released
(1:78.11.0+build1-0ubuntu2)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(78.9.1)
|
|
xenial |
Ignored
(end of standard support, was needs-triage)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |