□ 개요 o Thunderbird, Thunderbird ESR에서 발생하는 잘못된 패딩 사용 취약점(CVE-2025-26695) [1][2][4] o Thunderbird, Thunderbird ESR에서 발생하는 Use-After-Free 취약점(CVE-2025-1930, CVE-2025-1931) [1][2][5][6] o Thunderbird, Thunderbird ESR에서 발생하는 범위를 벗어난 액세스 취약점(CVE-2025-1932) [1][2][7] o Thunderbird, Thunderbird ESR에서 발생하는 JIT 손상 취약점(CVE-2025-1933) [1][2][8] o Thunderbird, Thunderbird ESR에서 발생하는 예기치 않은 GC 발생 취약점(CVE-2025-1934) [1][2][9] o Thunderbird, Thunderbird ESR에서 발생하는 클릭재킹 취약점(CVE-2025-1935) [1][2][10] o Thunderbird, Thunderbird ESR에서 발생하는 콘텐츠 해석 변경 취약점(CVE-2025-1936) [1][2][11] o Thunderbird, Thunderbird ESR에서 발생하는 임의 코드 실행 취약점(CVE-2025-1937, CVE-2025-1938) [1][2][12][13] o Thunderbird에서 발생하는 초기화 되지 않은 메모리 공개 취약점(CVE-2025-1942) [1][14] o Thunderbird에서 발생하는 임의 코드 실행 취약점(CVE-2025-1943) [1][15] o Thunderbird ESR에서 발생하는 범위를 벗어난 쓰기 취약점(CVE-2024-43097) [2][16] □ 영향받는 제품 및 해결 방안
※ 하단의 참고사이트를 확인하여 업데이트 수행 [1][2][17]
□ 참고사이트 [1] https://www.mozilla.org/en-US/security/advisories/mfsa2025-17/ [2] https://www.mozilla.org/en-US/security/advisories/mfsa2025-18/ [3] https://nvd.nist.gov/vuln/detail/CVE-2025-26696 [4] https://nvd.nist.gov/vuln/detail/CVE-2025-26695 [5] https://nvd.nist.gov/vuln/detail/CVE-2025-1930 [6] https://nvd.nist.gov/vuln/detail/CVE-2025-1931 [7] https://nvd.nist.gov/vuln/detail/CVE-2025-1932 [8] https://nvd.nist.gov/vuln/detail/CVE-2025-1933 [9] https://nvd.nist.gov/vuln/detail/CVE-2025-1934 [10] https://nvd.nist.gov/vuln/detail/CVE-2025-1935 [11] https://nvd.nist.gov/vuln/detail/CVE-2025-1936 [12] https://nvd.nist.gov/vuln/detail/CVE-2025-1937 [13] https://nvd.nist.gov/vuln/detail/CVE-2025-1938 [14] https://nvd.nist.gov/vuln/detail/CVE-2025-1942 [15] https://nvd.nist.gov/vuln/detail/CVE-2025-1943 [16] https://nvd.nist.gov/vuln/detail/CVE-2024-43097 [17] https://www.thunderbird.net/en-US/thunderbird/releases/ □ 문의사항 |