Ubuntu 12.04 LTS / 12.10 / 13.10 : thunderbird vulnerabilities (USN-2119-1)

Ubuntu Security Notice (C) 2014-2016 Canonical, Inc. / NASL script (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Christian Holler, Terrence Cole, Jesse Ruderman, Gary Kwong, Eric
Rescorla, Jonathan Kew, Dan Gohman, Ryan VanderMeulen and Sotaro Ikeda
discovered multiple memory safety issues in Thunderbird. If a user
were tricked in to opening a specially crafted message with scripting
enabled, an attacker could potentially exploit these to cause a denial
of service via application crash, or execute arbitrary code with the
privileges of the user invoking Thunderbird. (CVE-2014-1477)

Cody Crews discovered a method to bypass System Only Wrappers. If a
user had enabled scripting, an attacker could potentially exploit this
to steal confidential data or execute code with the privileges of the
user invoking Thunderbird. (CVE-2014-1479)

Fredrik Lonnqvist discovered a use-after-free in Thunderbird. If a
user had enabled scripting, an attacker could potentially exploit this
to cause a denial of service via application crash, or execute
arbitrary code with the priviliges of the user invoking Thunderbird.
(CVE-2014-1482)

Arthur Gerkis discovered a use-after-free in Thunderbird. If a user
had enabled scripting, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code with the priviliges of the user invoking Thunderbird.
(CVE-2014-1486)

Masato Kinugawa discovered a cross-origin information leak in web
worker error messages. If a user had enabled scripting, an attacker
could potentially exploit this to steal confidential information.
(CVE-2014-1487)

Several issues were discovered with ticket handling in NSS. An
attacker could potentially exploit these to cause a denial of service
or bypass cryptographic protection mechanisms. (CVE-2014-1490,
CVE-2014-1491)

Boris Zbarsky discovered that security restrictions on window objects
could be bypassed under certain circumstances. (CVE-2014-1481)

Fabian Cuchietti and Ateeq ur Rehman Khan discovered that it was
possible to bypass JavaScript execution restrictions when replying to
or forwarding mail messages in certain circumstances. An attacker
could potentially exploit this to steal confidential information or
modify message content. (CVE-2013-6674).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected thunderbird package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial