openSUSE Security Update : MozillaThunderbird (openSUSE-2019-2249)

critical Nessus Plugin ID 129663



The remote openSUSE host is missing a security update.


This update for MozillaThunderbird to version 68.1.1 fixes the following issues :

- CVE-2019-11709: Fixed several memory safety bugs.

- CVE-2019-11710: Fixed several memory safety bugs.

- CVE-2019-11711: Fixed a script injection within domain through inner window reuse. (bsc#1140868)

- CVE-2019-11712: Fixed an insufficient validation of cross-origin POST requests within NPAPI plugins.

- CVE-2019-11713: Fixed a use-after-free with HTTP/2 cached stream. (bsc#1140868)

- CVE-2019-11714: Fixed a crash in NeckoChild.

- CVE-2019-11715: Fixed an HTML parsing error that can contribute to content XSS. (bsc#1140868)

- CVE-2019-11716: Fixed an enumeration issue in globalThis. (bsc#1140868)

- CVE-2019-11717: Fixed an improper escaping of the caret character in origins. (bsc#1140868)

- CVE-2019-11719: Fixed an out-of-bounds read when importing curve25519 private key. (bsc#1140868)

- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)

- CVE-2019-11721: Fixed domain spoofing through unicode latin 'kra' character. (bsc#1140868)

- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries.

- CVE-2019-11724: Fixed a permissions issue with the retired site (bsc#1140868)

- CVE-2019-11725: Fixed a SafeBrowsing bypass through WebSockets. (bsc#1140868)

- CVE-2019-11727: Fixed an insufficient validation for PKCS#1 v1.5 signatures being used with TLS 1.3.

- CVE-2019-11728: Fixed port scanning through Alt-Svc header. (bsc#1140868)

- CVE-2019-11729: Fixed a segmentation fault due to empty or malformed p256-ECDH public keys. (bsc#1140868)

- CVE-2019-11730: Fixed an insufficient enforcement of the same-origin policy that treats all files in a directory as having the same-origin. (bsc#1140868)

- CVE-2019-11739: Fixed a Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message. (bsc#1150939)

- CVE-2019-11740: Fixed several memory safety bugs.

- CVE-2019-11742: Fixed a same-origin policy violation with SVG filters and canvas that enabled theft of cross-origin images. (bsc#1149303)

- CVE-2019-11743: Fixed a cross-origin access issue.

- CVE-2019-11744: Fixed a XSS involving breaking out of title and textarea elements using innerHTML.

- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)

- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)

- CVE-2019-11755: Fixed an insufficient validation of S/MIME messages that allowed the author to be spoofed.

This update was imported from the SUSE:SLE-15:Update update project.


Update the affected MozillaThunderbird packages.

See Also

Plugin Details

Severity: Critical

ID: 129663

File Name: openSUSE-2019-2249.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/7/2019

Updated: 4/19/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-11752


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2019-11714

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:mozillathunderbird, p-cpe:/a:novell:opensuse:mozillathunderbird-buildsymbols, p-cpe:/a:novell:opensuse:mozillathunderbird-debuginfo, p-cpe:/a:novell:opensuse:mozillathunderbird-debugsource, p-cpe:/a:novell:opensuse:mozillathunderbird-translations-common, p-cpe:/a:novell:opensuse:mozillathunderbird-translations-other, p-cpe:/a:novell:opensuse:enigmail, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/4/2019

Vulnerability Publication Date: 7/23/2019

Reference Information

CVE: CVE-2019-11709, CVE-2019-11710, CVE-2019-11711, CVE-2019-11712, CVE-2019-11713, CVE-2019-11714, CVE-2019-11715, CVE-2019-11716, CVE-2019-11717, CVE-2019-11719, CVE-2019-11720, CVE-2019-11721, CVE-2019-11723, CVE-2019-11724, CVE-2019-11725, CVE-2019-11727, CVE-2019-11728, CVE-2019-11729, CVE-2019-11730, CVE-2019-11739, CVE-2019-11740, CVE-2019-11742, CVE-2019-11743, CVE-2019-11744, CVE-2019-11746, CVE-2019-11752, CVE-2019-11755