Debian DSA-4295-1 : thunderbird - security update

critical Nessus Plugin ID 117505


The remote Debian host is missing a security-related update.


Multiple security issues have been found in Thunderbird: Multiple memory safety errors and use-after-frees may lead to the execution of arbitrary code or denial of service.

Debian follows the Thunderbird upstream releases. Support for the 52.x series has ended, so starting with this update we're now following the 60.x releases.

Between 52.x and 60.x, Thunderbird has undergone significant internal updates, which makes it incompatible with a number of extensions. For more information please refer to

In addition, the new Thunderbird packages require Rust to build. A compatible Rust toolchain has been backported to Debian stretch, but is not available for all architectures which previously supported the purely C++-based Thunderbird packages. Thus, the new Thunderbird packages don't support the mips, mips64el and mipsel architectures at this point.


Upgrade the thunderbird packages.

For the stable distribution (stretch), these problems have been fixed in version 1:60.0-3~deb9u1.

See Also

Plugin Details

Severity: Critical

ID: 117505

File Name: debian_DSA-4295.nasl

Version: 1.4

Type: local

Agent: unix

Published: 9/17/2018

Updated: 12/7/2018

Supported Sensors: Frictionless Assessment Agent, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P


Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:thunderbird, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 9/16/2018

Reference Information

CVE: CVE-2018-12361, CVE-2018-12367, CVE-2018-12371, CVE-2018-5156, CVE-2018-5187

DSA: 4295