
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-1936 affects Thunderbird versions prior to 115.8.1, where an encrypted email subject could be incorrectly and permanently assigned to another email message in Thunderbird's local cache. The vulnerability was discovered in early 2024 and publicly disclosed on March 4, 2024. This issue specifically impacts the email subject handling functionality in Thunderbird's OpenPGP implementation (Mozilla Advisory, NVD).
The vulnerability occurs when a user attempts to view multiple emails while a large encrypted email is being decrypted. Due to a race condition in the message header handling code, the encrypted subject from one message could be incorrectly assigned to another message in Thunderbird's local cache. The issue was identified as a regression caused by the removal of necessary checks in the isCurrentMessage() function. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
When exploited, this vulnerability could lead to the leakage of confidential information. If a user replies to a contaminated email message, they might accidentally expose the encrypted subject to unintended third parties. The impact is particularly significant as the subject contamination is permanent in the local cache until explicitly repaired (Mozilla Advisory).
The primary mitigation is to upgrade to Thunderbird version 115.8.1 or later, which contains the fix for this vulnerability. For users who have already experienced subject contamination, Mozilla recommends using the 'repair folder' functionality available from the context menu of email folders to erase incorrect subject assignments. The fix prevents future occurrences but does not automatically repair existing contaminations (Mozilla Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”