CVE-2021-23992
Publication date 13 April 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.
Status
Package | Ubuntu Release | Status |
---|---|---|
thunderbird | ||
22.04 LTS jammy |
Fixed 1:78.11.0+build1-0ubuntu2
|
|
20.04 LTS focal |
Fixed 1:78.11.0+build1-0ubuntu0.20.04.2
|
|
18.04 LTS bionic |
Fixed 1:78.11.0+build1-0ubuntu0.18.04.2
|
|
16.04 LTS xenial | Ignored end of standard support, was needs-triage | |
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4995-1
- Thunderbird vulnerabilities
- 22 June 2021
- USN-4995-2
- Thunderbird vulnerabilities
- 25 June 2021