VID |
28947 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Thunderbird installed on the remote Windows host is prior to 115.2.2. It is, therefore, affected by a vulnerability as referenced in the mfsa2023-40 advisory.
- Opening a malicious WebP image could lead to a heap buffer overflow in the content process. We are aware of this issue being exploited in other products in the wild. (CVE-2023-4863)
* References: https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ https://support.mozilla.org/ko/kb/update-firefox-latest-release
* Platforms Affected: Mozilla Foundation, Thunderbird versions prior to 115.2.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Thunderbird (115.2.2 or later), available from the Mozilla Web site at http://www.mozilla.com/thunderbird/ |
Related URL |
CVE-2023-4863 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|