USN-3927-1: Thunderbird vulnerabilities
thunderbird vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in Thunderbird.
Software Description
- thunderbird – Mozilla Open Source mail and newsgroup client
Details
It was discovered that Thunderbird allowed PAC files to specify that
requests to localhost are sent through the proxy to another server. If
proxy auto-detection is enabled, an attacker could potentially exploit
this to conduct attacks on local services and tools. (CVE-2018-18506)
Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
or execute arbitrary code. (CVE-2019-9788, CVE-2019-9790, CVE-2019-9791,
CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813)
A mechanism was discovered that removes some bounds checking for string,
array, or typed array accesses if Spectre mitigations have been disabled.
If a user were tricked in to opening a specially crafted website in a
browsing context with Spectre mitigations disabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2019-9793)
Update instructions
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 18.10
- thunderbird – 1:60.6.1+build2-0ubuntu0.18.10.1
- Ubuntu 18.04 LTS
- thunderbird – 1:60.6.1+build2-0ubuntu0.18.04.1
- Ubuntu 16.04 LTS
- thunderbird – 1:60.6.1+build2-0ubuntu0.16.04.1
- Ubuntu 14.04 LTS
- thunderbird – 1:60.6.1+build2-0ubuntu0.14.04.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
Leave a Reply