Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Thunderbird vulnerabilities
Informations
Name USN-3529-1 First vendor Publication 2018-01-29
Vendor Ubuntu Last vendor Modification 2018-01-29
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Thunderbird.

Software Description: - thunderbird: Mozilla Open Source mail and newsgroup client

Details:

It was discovered that a From address encoded with a null character is cut off in the message header display. An attacker could potentially exploit this to spoof the sender address. (CVE-2017-7829)

It was discovered that it is possible to execute JavaScript in RSS feeds in some circumstances. If a user were tricked in to opening a specially crafted RSS feed, an attacker could potentially exploit this in combination with another vulnerability, in order to cause unspecified problems. (CVE-2017-7846)

It was discovered that the RSS feed can leak local path names. If a user were tricked in to opening a specially crafted RSS feed, an attacker could potentially exploit this to obtain sensitive information. (CVE-2017-7847)

It was discovered that RSS feeds are vulnerable to new line injection. If a user were tricked in to opening a specially crafted RSS feed, an attacker could potentially exploit this to cause unspecified problems. (CVE-2017-7848)

Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, execute arbitrary code, or cause other unspecified effects. (CVE-2018-5089, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5013, CVE-2018-5104, CVE-2018-5117)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10:
thunderbird 1:52.6.0+build1-0ubuntu0.17.10.1

Ubuntu 16.04 LTS:
thunderbird 1:52.6.0+build1-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
thunderbird 1:52.6.0+build1-0ubuntu0.14.04.1

After a standard system update you need to restart Thunderbird to make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3529-1
CVE-2017-7829, CVE-2017-7846, CVE-2017-7847, CVE-2017-7848,
CVE-2018-5089, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097,
CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103,
CVE-2018-5104, CVE-2018-5117

Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:52.6.0+build1-0ubuntu0.17.10.1
https://launchpad.net/ubuntu/+source/thunderbird/1:52.6.0+build1-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:52.6.0+build1-0ubuntu0.14.04.1

Original Source

Url : http://www.ubuntu.com/usn/USN-3529-1

CWE : Common Weakness Enumeration

% Id Name
54 % CWE-416 Use After Free
15 % CWE-74 Failure to Sanitize Data into a Different Plane ('Injection')
8 % CWE-200 Information Exposure
8 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)
8 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 502
Application 111
Application 357
Os 4
Os 3
Os 2
Os 1
Os 2
Os 2
Os 2
Os 2
Os 3
Os 2

Snort® IPS/IDS

Date Description
2018-01-10 Multiple products non-ascii sender address spoofing attempt
RuleID : 45119 - Revision : 3 - Type : SERVER-MAIL
2018-01-10 Multiple products non-ascii sender address spoofing attempt
RuleID : 45118 - Revision : 3 - Type : SERVER-MAIL
2018-01-10 Multiple products non-ascii sender address spoofing attempt
RuleID : 45116 - Revision : 4 - Type : SERVER-MAIL
2018-01-10 Multiple products non-ascii sender address spoofing attempt
RuleID : 45115 - Revision : 4 - Type : SERVER-MAIL

Nessus® Vulnerability Scanner

Date Description
2018-04-04 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201803-14.nasl - Type : ACT_GATHER_INFO
2018-03-21 Name : The remote Windows host contains a mail client that is affected by multiple v...
File : mozilla_thunderbird_52_6.nasl - Type : ACT_GATHER_INFO
2018-03-21 Name : The remote macOS or Mac OS X host contains a mail client that is affected by ...
File : macosx_thunderbird_52_6.nasl - Type : ACT_GATHER_INFO
2018-02-20 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201802-03.nasl - Type : ACT_GATHER_INFO
2018-02-13 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2018-1044.nasl - Type : ACT_GATHER_INFO
2018-02-13 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2018-1043.nasl - Type : ACT_GATHER_INFO
2018-02-05 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_5044bd2308cb11e8b08f00012e582166.nasl - Type : ACT_GATHER_INFO
2018-02-02 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2018-0262.nasl - Type : ACT_GATHER_INFO
2018-01-31 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4102.nasl - Type : ACT_GATHER_INFO
2018-01-30 Name : The remote Debian host is missing a security update.
File : debian_DLA-1262.nasl - Type : ACT_GATHER_INFO
2018-01-25 Name : The remote Debian host is missing a security update.
File : debian_DLA-1256.nasl - Type : ACT_GATHER_INFO
2018-01-25 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4096.nasl - Type : ACT_GATHER_INFO
2018-01-25 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2018-0122.nasl - Type : ACT_GATHER_INFO
2018-01-24 Name : A web browser installed on the remote Windows host is affected by multiple vu...
File : mozilla_firefox_58_0.nasl - Type : ACT_GATHER_INFO
2018-01-24 Name : A web browser installed on the remote Windows host is affected by multiple vu...
File : mozilla_firefox_52_6_esr.nasl - Type : ACT_GATHER_INFO
2018-01-24 Name : A web browser installed on the remote macOS or Mac OS X host is affected by a...
File : macosx_firefox_58_0.nasl - Type : ACT_GATHER_INFO
2018-01-24 Name : A web browser installed on the remote macOS or Mac OS X host is affected by m...
File : macosx_firefox_52_6_esr.nasl - Type : ACT_GATHER_INFO
2018-01-24 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_a891c5b43d7a4de99c71eef3fd698c77.nasl - Type : ACT_GATHER_INFO
2018-01-09 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2018-0061.nasl - Type : ACT_GATHER_INFO
2018-01-02 Name : The remote Windows host contains a mail client that is affected by multiple v...
File : mozilla_thunderbird_52_5_2.nasl - Type : ACT_GATHER_INFO
2018-01-02 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4075.nasl - Type : ACT_GATHER_INFO
2017-12-28 Name : The remote Debian host is missing a security update.
File : debian_DLA-1223.nasl - Type : ACT_GATHER_INFO
2017-12-26 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_6a09c80e6ec7442abc65d72ce69fd887.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2018-08-03 21:21:32
  • Multiple Updates
2018-06-13 09:21:18
  • Multiple Updates
2018-01-30 00:19:36
  • First insertion