Debian DSA-4295-1 : thunderbird - security update

critical Nessus Plugin ID 117505

Synopsis

The remote Debian host is missing a security-related update.

Description

Multiple security issues have been found in Thunderbird: Multiple memory safety errors and use-after-frees may lead to the execution of arbitrary code or denial of service.

Debian follows the Thunderbird upstream releases. Support for the 52.x series has ended, so starting with this update we're now following the 60.x releases.

Between 52.x and 60.x, Thunderbird has undergone significant internal updates, which makes it incompatible with a number of extensions. For more information please refer to https://support.mozilla.org/en-US/kb/new-thunderbird-60

In addition, the new Thunderbird packages require Rust to build. A compatible Rust toolchain has been backported to Debian stretch, but is not available for all architectures which previously supported the purely C++-based Thunderbird packages. Thus, the new Thunderbird packages don't support the mips, mips64el and mipsel architectures at this point.

Solution

Upgrade the thunderbird packages.

For the stable distribution (stretch), these problems have been fixed in version 1:60.0-3~deb9u1.

See Also

https://support.mozilla.org/en-US/kb/new-thunderbird-60

https://security-tracker.debian.org/tracker/source-package/thunderbird

https://packages.debian.org/source/stretch/thunderbird

https://www.debian.org/security/2018/dsa-4295

Plugin Details

Severity: Critical

ID: 117505

File Name: debian_DSA-4295.nasl

Version: 1.4

Type: local

Agent: unix

Published: 9/17/2018

Updated: 12/7/2018

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:thunderbird, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 9/16/2018

Reference Information

CVE: CVE-2018-12361, CVE-2018-12367, CVE-2018-12371, CVE-2018-5156, CVE-2018-5187

DSA: 4295