When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird < 91.10.
References
Link Resource
https://bugzilla.mozilla.org/show_bug.cgi?id=1767816 Issue Tracking Permissions Required Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2022-22/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mozilla

Published: 2022-12-22T00:00:00

Updated: 2022-12-22T00:00:00

Reserved: 2022-05-23T00:00:00


Link: CVE-2022-1834

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-12-22T20:15:13.513

Modified: 2022-12-29T16:38:09.717


Link: CVE-2022-1834

JSON object: View

cve-icon Redhat Information

No data.

CWE