Amazon Linux 2 : thunderbird (ALAS-2018-1032)

critical Nessus Plugin ID 110449


The remote Amazon Linux 2 host is missing a security update.


The following CVEs are fixed in the updated thunderbird package :

CVE-2018-5161 : Hang via malformed headers

CVE-2018-5162 : Encrypted mail leaks plaintext through src attribute

CVE-2018-5183 : Backport critical security fixes in Skia

CVE-2018-5155 : Use-after-free with SVG animations and text paths

CVE-2018-5170 : Filename spoofing for external attachments

CVE-2018-5184 : Full plaintext recovery in S/MIME via chosen-ciphertext attack

CVE-2018-5159 : Integer overflow and out-of-bounds write in Skia

CVE-2018-5178 : Buffer overflow during UTF-8 to Unicode string conversion through legacy extension

CVE-2018-5168 : Lightweight themes can be installed without user interaction

CVE-2018-5150 : Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8

CVE-2018-5154 : Use-after-free with SVG animations and clip paths

CVE-2018-5185 : Leaking plaintext through HTML forms


Run 'yum update thunderbird' to update your system.

See Also

Plugin Details

Severity: Critical

ID: 110449

File Name: al2_ALAS-2018-1032.nasl

Version: 1.7

Type: local

Agent: unix

Published: 6/12/2018

Updated: 5/29/2020

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:thunderbird, p-cpe:/a:amazon:linux:thunderbird-debuginfo, cpe:/o:amazon:linux:2

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/11/2018

Vulnerability Publication Date: 6/11/2018

Reference Information

CVE: CVE-2018-5150, CVE-2018-5154, CVE-2018-5155, CVE-2018-5159, CVE-2018-5161, CVE-2018-5162, CVE-2018-5168, CVE-2018-5170, CVE-2018-5178, CVE-2018-5183, CVE-2018-5184, CVE-2018-5185

ALAS: 2018-1032