CVE-2020-6794
Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
If a user saved passwords before Thunderbird 60 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Thunderbird 60. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Thunderbird < 68.5.
Si un usuario ha guardado las contraseñas antes de Thunderbird versión 60 y luego más tarde estableció una contraseña maestra, una copia no cifrada de estas contraseñas aún son accesibles. Esto es debido a que el archivo de contraseñas almacenadas más antiguo no fue eliminado cuando los datos fueron copiados a un nuevo formato a partir de Thunderbird versión 60. La nueva contraseña maestra es agregada sólo en el nuevo archivo. Esto podría permitir la exposición de los datos de las contraseñas almacenadas fuera de las expectativas del usuario. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.5.
It was discovered that Message ID calculation was based on uninitialized data. An attacker could potentially exploit this to obtain sensitive information. Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, or execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-10 CVE Reserved
- 2020-02-14 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-312: Cleartext Storage of Sensitive Information
- CWE-459: Incomplete Cleanup
- CWE-522: Insufficiently Protected Credentials
CAPEC
References (7)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1606619 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202003-10 | 2022-01-01 | |
https://usn.ubuntu.com/4328-1 | 2022-01-01 | |
https://usn.ubuntu.com/4335-1 | 2022-01-01 | |
https://www.mozilla.org/security/advisories/mfsa2020-07 | 2022-01-01 | |
https://access.redhat.com/security/cve/CVE-2020-6794 | 2020-02-24 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1801956 | 2020-02-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 68.5.0 Search vendor "Mozilla" for product "Thunderbird" and version " < 68.5.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 19.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "19.10" | - |
Affected
|