Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Kai Engert as the original reporter.", "affected_release": [{"advisory": "RHSA-2023:0817", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:102.8.0-2.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0821", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:102.8.0-2.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0818", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:102.8.0-2.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0819", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0819", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "thunderbird-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0819", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "thunderbird-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0820", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "thunderbird-0:102.8.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0822", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "thunderbird-0:102.8.0-2.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0824", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:102.8.0-2.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0823", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "thunderbird-0:102.8.0-2.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}], "bugzilla": {"description": "Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP", "id": "2171397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171397"}, "csaw": false, "cvss3": {"cvss3_base_score": "4.3", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "status": "verified"}, "cwe": "CWE-449", "details": ["If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird < 102.8.", "The Mozilla Foundation Security Advisory describes this flaw as:\nIf a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack."], "name": "CVE-2023-0616", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-02-14T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-0616\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-0616\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-07/#CVE-2023-0616"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Low"}