It is possible to spoof the sender's email address and display an arbitrary sender address to the email recipient. The real sender's address is not displayed if preceded by a null character in the display string. This vulnerability affects Thunderbird < 52.5.2.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html | third party advisory mailing list |
https://usn.ubuntu.com/3529-1/ | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1423432 | issue tracking exploit patch |
http://www.securityfocus.com/bid/102258 | vdb entry third party advisory |
http://www.securitytracker.com/id/1040123 | vdb entry third party advisory |
https://www.mozilla.org/security/advisories/mfsa2017-30/ | vendor advisory |
https://www.debian.org/security/2017/dsa-4075 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0061 | third party advisory vendor advisory |