CVE-2024-1936

The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third-party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird < 115.8.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
mozillaCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Debian logo
Debian Releases
Debian Product
Codename
thunderbird
bullseye
1:115.12.0-1~deb11u1
fixed
bullseye (security)
1:128.11.0esr-1~deb11u1
fixed
bookworm
1:128.10.0esr-1~deb12u1
fixed
bookworm (security)
1:128.10.1esr-1~deb12u1
fixed
trixie
1:128.10.0esr-1
fixed
sid
1:128.11.0esr-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
thunderbird
noble
not-affected
mantic
Fixed 115.8.1+build1-0ubuntu0.23.10.1
released
jammy
Fixed 1:115.8.1+build1-0ubuntu0.22.04.1
released
focal
Fixed 1:115.8.1+build1-0ubuntu0.20.04.1
released