vulnerability
Ubuntu: USN-7663-1 (CVE-2025-3875): Thunderbird vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | May 14, 2025 | Jul 23, 2025 | Aug 18, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
May 14, 2025
Added
Jul 23, 2025
Modified
Aug 18, 2025
Description
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.
Solution
ubuntu-upgrade-thunderbird
References
- CVE-2025-3875
- https://attackerkb.com/topics/CVE-2025-3875
- CWE-290
- UBUNTU-USN-7663-1
- URL-https://bugzilla.mozilla.org/show_bug.cgi?id=1950629
- URL-https://ubuntu.com/security/notices/USN-7663-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-3875
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2025-34/#CVE-2025-3875
- URL-https://www.mozilla.org/security/advisories/mfsa2025-34/
- URL-https://www.mozilla.org/security/advisories/mfsa2025-35/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.