Mozilla released five patches for Thunderbird security vulnerabilities, including one critical buffer overflow bug affecting Windows machines.
Mozilla this week fixed a severe security problem in its open-source Thunderbird email client, which also serves as a client for news, RSS, and chat. The most critical flaw (CVE-2017-7845) is a buffer overflow bug affecting Thunderbird running on the Windows OS.
"A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content," Mozilla wrote. "This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash." The same bug was fixed in the Firefox browser earlier in December.
The critical patch was one of five security bugs Mozilla fixed this month. Others include two vulnerabilities rated high, one moderate, and one low. Both of the highly rated security flaws affected the RSS feed. The moderate and low bugs affected RSS and email, respectively.
The latest version of Thunderbird, 52.5.2, fixes all of the flaws. Read more details here.
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024