A vulnerability was found in Mozilla’s Thunderbird. A patch is already available and should be installed soon.
With a certain amount of effort, the vulnerability can exploit a use-after-free memory error and inject malicious code. Mozilla writes more about this on its website.
The re it is pointed out, however, that such vulnerabilities are not exploited via e-mails in Thunderbird, since scripting is deactivated by default when reading e-mails. However, they pose a certain risk in the browser or in browser-like contexts.
It is advisable to update Thunderbird as soon as possible. Usually this is done automatically. Alternatively, the update can also be triggered manually via the setting.
Downloads:
[ source link ]
https://www.onlinepc.ch/internet/sicherheit/mozilla-patcht-kritische-luecke-in-thunderbird-2622746.html
Mozilla patches critical vulnerabilities Thunderbird