An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key - CVE-2021-23991ID: oval:org.secpod.oval:def:70869 | Date: (C)2021-04-09 (M)2023-11-19 |
Class: VULNERABILITY | Family: macos |
Mozilla Thunderbird before 78.9.1: If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.15 |
Apple Mac OS 11 |
Product: |
Mozilla Thunderbird |