Improper Certificate Validation Affecting thunderbird-debuginfo package, versions <0:17.0.3-1.el5_9


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.65% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL10-THUNDERBIRDDEBUGINFO-9836537
  • published28 Apr 2025
  • disclosed19 Feb 2013

Introduced: 19 Feb 2013

CVE-2013-0776  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade RHEL:10 thunderbird-debuginfo to version 0:17.0.3-1.el5_9 or higher.
This issue was patched in RHSA-2013:0272.

NVD Description

Note: Versions mentioned in the description apply only to the upstream thunderbird-debuginfo package and not the thunderbird-debuginfo package as distributed by RHEL. See How to fix? for RHEL:10 relevant fixed versions and status.

Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.

CVSS Base Scores

version 3.1