Site icon 지락문화예술공작단

USN-3927-1: Thunderbird vulnerabilities

USN-3927-1: Thunderbird vulnerabilities

thunderbird vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

Summary

Several security issues were fixed in Thunderbird.

Software Description

Details

It was discovered that Thunderbird allowed PAC files to specify that
requests to localhost are sent through the proxy to another server. If
proxy auto-detection is enabled, an attacker could potentially exploit
this to conduct attacks on local services and tools. (CVE-2018-18506)

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
or execute arbitrary code. (CVE-2019-9788, CVE-2019-9790, CVE-2019-9791,
CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813)

A mechanism was discovered that removes some bounds checking for string,
array, or typed array accesses if Spectre mitigations have been disabled.
If a user were tricked in to opening a specially crafted website in a
browsing context with Spectre mitigations disabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2019-9793)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
thunderbird1:60.6.1+build2-0ubuntu0.18.10.1
Ubuntu 18.04 LTS
thunderbird1:60.6.1+build2-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
thunderbird1:60.6.1+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS
thunderbird1:60.6.1+build2-0ubuntu0.14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Thunderbird to make
all the necessary changes.

References

Source: USN-3927-1: Thunderbird vulnerabilities

Exit mobile version