SB2025042928 - Multiple vulnerabilities in Mozilla Thunderbird



SB2025042928 - Multiple vulnerabilities in Mozilla Thunderbird

Published: April 29, 2025

Security Bulletin ID SB2025042928
Severity
High
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 45% Medium 27% Low 27%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Improper locking (CVE-ID: CVE-2025-2817)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper locking mechanism in Firefox Updater. A medium-integrity user process can  interfere with the SYSTEM-level updater by manipulating the file-locking behavior by injecting code into the user-privileged process. A local user or malicious software installed on the system can bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation.


2) Buffer overflow (CVE-ID: CVE-2025-4082)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing WebGL shader attributes. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Note, the vulnerability affects macOS installations only.


3) Protection Mechanism Failure (CVE-ID: CVE-2025-4083)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient process isolation when handling "javascript:" URI links. An attacker can trick the victim into clicking on a specially crafted link and execute content in the top-level document's process instead of the intended frame.


4) Information disclosure (CVE-ID: CVE-2025-4085)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the UITour actor. A remote attacker can gain unauthorized access to sensitive information on the system.


5) Input validation error (CVE-ID: CVE-2025-4086)

The vulnerability allows a remote attacker to perform a spoofing attack.

The vulnerability exists due to insufficient validation of file names. A remote attacker can trick the victim into downloading a specially crafted file containing a large number of encoded newline characters in its name and obscure the file's extension when displayed in the download dialog.


6) Out-of-bounds read (CVE-ID: CVE-2025-4087)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary condition when parsing XPath content. A remote attacker can trick the victim into visiting a specially crafted website, trigger an out-of-bounds read error and execute arbitrary code on the system.


7) Cross-site request forgery (CVE-ID: CVE-2025-4088)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A malicious website can use redirects to send credentialed requests to arbitrary endpoints on any site that had invoked the Storage Access API.


8) Input validation error (CVE-ID: CVE-2025-4089)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient escaping of special characters in the "copy as cURL" feature. A remote attacker can trick the victim into copying a specially crafted URL and execute arbitrary code on the system.


9) Information disclosure (CVE-ID: CVE-2025-4090)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can force the application to log sensitive library locations via Logcat.


10) Buffer overflow (CVE-ID: CVE-2025-4091)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


11) Buffer overflow (CVE-ID: CVE-2025-4092)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.