Wednesday, April 30, 2014

USN-2189-1: Thunderbird vulnerabilities

Ubuntu Security Notice USN-2189-1


30th April, 2014


thunderbird vulnerabilities


A security issue affects these releases of Ubuntu and its derivatives:



  • Ubuntu 14.04 LTS

  • Ubuntu 13.10

  • Ubuntu 12.10

  • Ubuntu 12.04 LTS


Summary


Several security issues were fixed in Thunderbird.


Software description



  • thunderbird - Mozilla Open Source mail and newsgroup client


Details


Bobby Holley, Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij,

Jesse Ruderman, Nathan Froyd and Christian Holler discovered multiple

memory safety issues in Thunderbird. If a user were tricked in to opening

a specially crafted message with scripting enabled, an attacker could

potentially exploit these to cause a denial of service via application

crash, or execute arbitrary code with the privileges of the user invoking

Thunderbird. (CVE-2014-1518)


Abhishek Arya discovered an out of bounds read when decoding JPG images.

An attacker could potentially exploit this to cause a denial of service

via application crash. (CVE-2014-1523)


Abhishek Arya discovered a buffer overflow when a script uses a non-XBL

object as an XBL object. If a user had enabled scripting, an attacker

could potentially exploit this to execute arbitrary code with the

privileges of the user invoking Thunderbird. (CVE-2014-1524)


Mariusz Mlynski discovered that sites with notification permissions can

run script in a privileged context in some circumstances. If a user had

enabled scripting, an attacker could exploit this to execute arbitrary

code with the privileges of the user invoking Thunderbird. (CVE-2014-1529)


It was discovered that browser history navigations could be used to load

a site with the addressbar displaying the wrong address. If a user had

enabled scripting, an attacker could potentially exploit this to conduct

cross-site scripting or phishing attacks. (CVE-2014-1530)


A use-after-free was discovered when resizing images in some

circumstances. If a user had enabled scripting, an attacker could

potentially exploit this to cause a denial of service via application

crash or execute arbitrary code with the privileges of the user invoking

Thunderbird. (CVE-2014-1531)


Tyson Smith and Jesse Schwartzentruber discovered a use-after-free during

host resolution in some circumstances. An attacker could potentially

exploit this to cause a denial of service via application crash or execute

arbitrary code with the privileges of the user invoking Thunderbird.

(CVE-2014-1532)


Update instructions


The problem can be corrected by updating your system to the following package version:



Ubuntu 14.04 LTS:

thunderbird 1:24.5.0+build1-0ubuntu0.14.04.1

Ubuntu 13.10:

thunderbird 1:24.5.0+build1-0ubuntu0.13.10.1

Ubuntu 12.10:

thunderbird 1:24.5.0+build1-0ubuntu0.12.10.1

Ubuntu 12.04 LTS:

thunderbird 1:24.5.0+build1-0ubuntu0.12.04.1


To update your system, please follow these instructions: http://bit.ly/1aJDvTw.


After a standard system update you need to restart Thunderbird to make

all the necessary changes.


References


CVE-2014-1518, CVE-2014-1523, CVE-2014-1524, CVE-2014-1529, CVE-2014-1530, CVE-2014-1531, CVE-2014-1532, LP: 1313886






via Ubuntu Security Notices http://bit.ly/1kqlEWo

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.