Risk | High |
Patch available | YES |
Number of vulnerabilities | 10 |
CVE-ID | CVE-2022-2200 CVE-2022-2226 CVE-2022-31744 CVE-2022-34468 CVE-2022-34470 CVE-2022-34472 CVE-2022-34478 CVE-2022-34479 CVE-2022-34481 CVE-2022-34484 |
CWE-ID | CWE-94 CWE-347 CWE-254 CWE-416 CWE-388 CWE-939 CWE-1021 CWE-190 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Linux Enterprise Storage Operating systems & Components / Operating system SUSE Linux Enterprise Workstation Extension Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Linux Enterprise Desktop Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE Linux Enterprise Module for Packagehub Subpackages Operating systems & Components / Operating system package or component MozillaThunderbird-translations-other Operating systems & Components / Operating system package or component MozillaThunderbird-translations-common Operating systems & Components / Operating system package or component MozillaThunderbird-debugsource Operating systems & Components / Operating system package or component MozillaThunderbird-debuginfo Operating systems & Components / Operating system package or component MozillaThunderbird Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 10 vulnerabilities.
EUVDB-ID: #VU64762
Risk: Medium
CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-2200
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation when handling JavaScript attributes. A remote attacker can pass undesired attributes to JavaScript object and perform prototype pollution and execute arbitrary JavaScript code in the browser.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64769
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2226
CWE-ID:
CWE-347 - Improper Verification of Cryptographic Signature
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to improper validation of digital signatures. When displaying an email that contains a digital signature, the email's
date will be shown. If the dates were different, then Thunderbird didn't
report the email as having an invalid signature. If an attacker
performed a replay attack, in which an old email with old contents are
resent at a later time, it could lead the victim to believe that the
statements in the email are current.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63881
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-31744
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error when processing CSS stylesheets accessible via internal URIs, as "resource:". A remote attacker can bypass implemented Content Security Policy.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64752
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34468
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to improper handling of the CSP sandbox header without "allow-scripts" option. A remote attacker use an iframe to bypass implemented CSP restriction and execute scripts if the user clicks on a javascript:
link.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64751
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-34470
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in nsSHistory when handling XML documents. A remote attacker can trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64760
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34472
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to influence browser behavior.
The vulnerability exists due to improper error handling when processing unavailable PAC file. If a PAC URL is set and the server that hosts the PAC is unreachable, OCSP requests are blocked, resulting in incorrect error pages being shown.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64761
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34478
CWE-ID:
CWE-939 - Improper Authorization in Handler for Custom URL Scheme
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insecure usage of URI handlers that allow usage of ms-msdt
, search
, and search-ms
protocols. A remote attacker can trick the victim to click on a specially crafted link and execute arbitrary code on the system, if the victim accepts the browser prompt.
The vulnerability affects Firefox on Windows.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64750
Risk: Medium
CVSSv4.0: 4.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34479
CWE-ID:
CWE-1021 - Improper Restriction of Rendered UI Layers or Frames
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to improper handling of resizing event for a popup window. A remote attacker can create a specially crafted website that can create a resized popup to overlay the address bar with its own content and perform spoofing attack.
Note, the vulnerability affects Linux installations only.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64756
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34481
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in the nsTArray_Impl::ReplaceElementsAt()
function. A remote attacker can trick the victim to visit a specially crafted website, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64763
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-34484
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Linux Enterprise Workstation Extension: 15-SP3 - 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3 - 15-SP4
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server: 15-SP3 - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP3 - 15-SP4
MozillaThunderbird-translations-other: before 91.11.0-150200.8.76.1
MozillaThunderbird-translations-common: before 91.11.0-150200.8.76.1
MozillaThunderbird-debugsource: before 91.11.0-150200.8.76.1
MozillaThunderbird-debuginfo: before 91.11.0-150200.8.76.1
MozillaThunderbird: before 91.11.0-150200.8.76.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222320-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.