Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2632-1 | thunderbird security update |
Debian DSA |
DSA-4897-1 | thunderbird security update |
EUVD |
EUVD-2021-10912 | Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1. |
Ubuntu USN |
USN-4995-1 | Thunderbird vulnerabilities |
Ubuntu USN |
USN-4995-2 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-03T19:14:10.020Z
Reserved: 2021-01-13T00:00:00
Link: CVE-2021-23992
No data.
Status : Modified
Published: 2021-06-24T14:15:09.227
Modified: 2024-11-21T05:52:10.067
Link: CVE-2021-23992
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN