Description
The HTML rendering engine in Mozilla Thunderbird 1.5, when "Block loading of remote images in mail messages" is enabled, does not properly block external images from inline HTML attachments, which could allow remote attackers to obtain sensitive information, such as application version or IP address, when the user reads the email and the external image is accessed.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Crashfr · textwebappsphp
https://www.exploit-db.com/exploits/27337
References (27)
Core 27
Core References
Various Sources x_refsource_confirm
http://www.mozilla.org/security/announce/2006/mfsa2006-26.html
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2006-0330.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19902
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/276-1/
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19941
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1975
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19821
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10254
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19823
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2006/dsa-1051
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3749
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1356
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_hp
http://www.securityfocus.com/archive/1/446657/100/200/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24959
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/514
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2006:078
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/20051
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19863
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/16881
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17516
Vendor Advisory vendor-advisory
x_refsource_suse
http://www.novell.com/linux/security/advisories/2006_04_25.html
Exploit mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/426347
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22065
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19950
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2006/dsa-1046
Scores
EPSS
0.1040
EPSS Percentile
93.3%
Details
Status
published
Products (1)
mozilla/thunderbird
1.5
Published
Mar 07, 2006
Tracked Since
Feb 18, 2026