Use of a Risky Cryptographic Algorithm Affecting mozilla package, versions [,78.9.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of a Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-MOZILLA-2378849
  • published26 Jan 2022
  • disclosed24 Jun 2021
  • creditUnknown

Introduced: 24 Jun 2021

CVE-2021-23993  (opens in a new tab)
CWE-327  (opens in a new tab)

How to fix?

Upgrade mozilla to version 78.9.1 or higher.

Overview

Affected versions of this package are vulnerable to Use of a Risky Cryptographic Algorithm. An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.

CVSS Scores

version 3.1