| Vulnerability Name: | CVE-2021-29949 (CCN-204387) | ||||||||||||||||||
| Assigned: | 2021-04-08 | ||||||||||||||||||
| Published: | 2021-04-08 | ||||||||||||||||||
| Updated: | 2021-06-30 | ||||||||||||||||||
| Summary: | When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1. | ||||||||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||
| CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||
| Vulnerability Type: | CWE-427 CWE-426 | ||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-29949 Source: MISC Type: Permissions Required, Vendor Advisory https://bugzilla.mozilla.org/show_bug.cgi?id=1682101 Source: XF Type: UNKNOWN mozilla-thunderbird-cve202129949-code-exec(204387) Source: CCN Type: Mozilla Foundation Security Advisory 2021-13 Security Vulnerabilities fixed in Thunderbird 78.9.1 Source: MISC Type: Release Notes, Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2021-13/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-29949 | ||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||
| Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
| BACK | |||||||||||||||||||