A vulnerability was identified in Thunderbird where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird < 128.10.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1952465 | permissions required |
https://www.mozilla.org/security/advisories/mfsa2025-28/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-29/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-31/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-32/ | vendor advisory |