Thursday, October 31, 2013

USN-2010-1: Thunderbird vulnerabilities

Ubuntu Security Notice USN-2010-1


31st October, 2013


thunderbird vulnerabilities


A security issue affects these releases of Ubuntu and its derivatives:



  • Ubuntu (saucy)

  • Ubuntu 13.04

  • Ubuntu 12.10

  • Ubuntu 12.04 LTS


Summary


Several security issues were fixed in Thunderbird.


Software description



  • thunderbird - Mozilla Open Source mail and newsgroup client


Details


Multiple memory safety issues were discovered in Thunderbird. If a user

were tricked in to opening a specially crafted message with scripting

enabled, an attacker could possibly exploit these to cause a denial of

service via application crash, or potentially execute arbitrary code with

the privileges of the user invoking Thunderbird. (CVE-2013-1739,

CVE-2013-5590, CVE-2013-5591)


Jordi Chancel discovered that HTML select elements could display arbitrary

content. If a user had scripting enabled, an attacker could potentially

exploit this to conduct URL spoofing or clickjacking attacks.

(CVE-2013-5593)


Abhishek Arya discovered a crash when processing XSLT data in some

circumstances. If a user had scripting enabled, an attacker could

potentially exploit this to execute arbitrary code with the privileges

of the user invoking Thunderbird. (CVE-2013-5604)


Dan Gohman discovered a flaw in the Javascript engine. If a user had

enabled scripting, when combined with other vulnerabilities an attacker

could possibly exploit this to execute arbitrary code with the privileges

of the user invoking Thunderbird. (CVE-2013-5595)


Ezra Pool discovered a crash on extremely large pages. If a user had

scripting enabled, an attacker could potentially exploit this to execute

arbitrary code with the privileges of the user invoking Thunderbird.

(CVE-2013-5596)


Byoungyoung Lee discovered a use-after-free when updating the offline

cache. If a user had scripting enabled, an attacker could potentially

exploit this to cause a denial of service via application crash or

execute arbitrary code with the privileges of the user invoking

Thunderbird. (CVE-2013-5597)


Multiple use-after-free flaws were discovered in Thunderbird. If a user

had scripting enabled, an attacker could potentially exploit these to

cause a denial of service via application crash or execute arbitrary code

with the privileges of the user invoking Thunderbird. (CVE-2013-5599,

CVE-2013-5600, CVE-2013-5601)


A memory corruption flaw was discovered in the Javascript engine when

using workers with direct proxies. If a user had scripting enabled, an

attacker could potentially exploit this to cause a denial of service

via application crash or execute arbitrary code with the privileges of

the user invoking Thunderbird. (CVE-2013-5602)


Abhishek Arya discovered a use-after-free when interacting with HTML

document templates. If a user had scripting enabled, an attacker could

potentially exploit this to cause a denial of service via application

crash or execute arbitrary code with the privileges of the user invoking

Thunderbird. (CVE-2013-5603)


Update instructions


The problem can be corrected by updating your system to the following package version:



Ubuntu (saucy):

thunderbird 1:24.1.0+build1-0ubuntu0.13.10.1

Ubuntu 13.04:

thunderbird 1:24.1.0+build1-0ubuntu0.13.04.1

Ubuntu 12.10:

thunderbird 1:24.1.0+build1-0ubuntu0.12.10.1

Ubuntu 12.04 LTS:

thunderbird 1:24.1.0+build1-0ubuntu0.12.04.1


To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.


After a standard system update you need to restart Thunderbird to make

all the necessary changes.


References


CVE-2013-1739, CVE-2013-5590, CVE-2013-5591, CVE-2013-5593, CVE-2013-5595, CVE-2013-5596, CVE-2013-5597, CVE-2013-5599, CVE-2013-5600, CVE-2013-5601, CVE-2013-5602, CVE-2013-5603, CVE-2013-5604, LP: 1245422






via Ubuntu Security Notices http://www.ubuntu.com/usn/usn-2010-1/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.