openSUSE Security Update : MozillaThunderbird (openSUSE-2019-664)

critical Nessus Plugin ID 123288
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for MozillaThunderbird to version 60.0 fixes the following issues :

These security issues were fixed :

- CVE-2018-12359: Prevent buffer overflow using computed size of canvas element (bsc#1098998).

- CVE-2018-12360: Prevent use-after-free when using focus() (bsc#1098998).

- CVE-2018-12361: Prevent integer overflow in SwizzleData (bsc#1098998).

- CVE-2018-12362: Prevent integer overflow in SSSE3 scaler (bsc#1098998).

- CVE-2018-5156: Prevent media recorder segmentation fault when track type is changed during capture (bsc#1098998).

- CVE-2018-12363: Prevent use-after-free when appending DOM nodes (bsc#1098998).

- CVE-2018-12364: Prevent CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998).

- CVE-2018-12365: Prevent compromised IPC child process listing local filenames (bsc#1098998).

- CVE-2018-12371: Prevent integer overflow in Skia library during edge builder allocation (bsc#1098998).

- CVE-2018-12366: Prevent invalid data handling during QCMS transformations (bsc#1098998).

- CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming (bsc#1098998).

- CVE-2018-5187: Various memory safety bugs (bsc#1098998).

- CVE-2018-5188: Various memory safety bugs (bsc#1098998).

These can not, in general, be exploited through email, but are potential risks in browser or browser-like contexts.

These non-security issues were fixed :

- Storing of remote content settings fixed (bsc#1084603)

- Improved message handling and composing

- Improved handling of message templates

- Support for OAuth2 and FIDO U2F

- Various Calendar improvements

- Various fixes and changes to e-mail workflow

- Various IMAP fixes

- Native desktop notifications

Solution

Update the affected MozillaThunderbird packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1084603

https://bugzilla.opensuse.org/show_bug.cgi?id=1098998

Plugin Details

Severity: Critical

ID: 123288

File Name: openSUSE-2019-664.nasl

Version: 1.5

Type: local

Agent: unix

Published: 3/27/2019

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:MozillaThunderbird, p-cpe:/a:novell:opensuse:MozillaThunderbird-buildsymbols, p-cpe:/a:novell:opensuse:MozillaThunderbird-debuginfo, p-cpe:/a:novell:opensuse:MozillaThunderbird-debugsource, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-common, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-other, cpe:/o:novell:opensuse:15.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2019

Vulnerability Publication Date: 10/18/2018

Reference Information

CVE: CVE-2018-12359, CVE-2018-12360, CVE-2018-12361, CVE-2018-12362, CVE-2018-12363, CVE-2018-12364, CVE-2018-12365, CVE-2018-12366, CVE-2018-12367, CVE-2018-12371, CVE-2018-5156, CVE-2018-5187, CVE-2018-5188