Impact
Thunderbird’s IMAP parser fails to verify the length of incoming strings. A malicious mail server can send a string with a negative length, causing the parser to read beyond the allocated buffer. This out‑of‑bounds read may expose sensitive memory contents or trigger a crash, resulting in loss of data confidentiality or availability.
Affected Systems
Mozilla Thunderbird clients older than version 149, including the extended‑support release builds prior to 140.9, are affected. Both the standard Thunderbird and the ESR releases are impacted.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.4, indicating high severity, but the EPSS probability is below 1 %, and it is not listed in CISA’s KEV catalog, suggesting a low likelihood of active exploitation. Attackers must control a mail server or compromise the network connection to a target client, then send specially crafted IMAP messages containing negative length fields. Once processed, the out‑of‑bounds read could disclose internal memory or crash the client.
OpenCVE Enrichment
Debian DLA
Debian DSA