openSUSE Security Update : MozillaThunderbird (openSUSE-2020-231)

high Nessus Plugin ID 133760

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for MozillaThunderbird fixes the following issues :

- Mozilla Thunderbird 68.5 (bsc#1162777) MFSA 2020-07 (bsc#1163368)

- CVE-2020-6793 (bmo#1608539) Out-of-bounds read when processing certain email messages

- CVE-2020-6794 (bmo#1606619) Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords

- CVE-2020-6795 (bmo#1611105) Crash processing S/MIME messages with multiple signatures

- CVE-2020-6797 (bmo#1596668) Extensions granted downloads.open permission could open arbitrary applications on Mac OSX

- CVE-2020-6798 (bmo#1602944) Incorrect parsing of template tag could result in JavaScript injection

- CVE-2020-6792 (bmo#1609607) Message ID calculcation was based on uninitialized data

- CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543, bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785) Memory safety bugs fixed in Thunderbird 68.5

- new: Support for Client Identity IMAP/SMTP Service Extension (bmo#1532388)

- new: Support for OAuth 2.0 authentication for POP3 accounts (bmo#1538409)

- fixed: Status area goes blank during account setup (bmo#1593122)

- fixed: Calendar: Could not remove color for default categories (bmo#1584853)

- fixed: Calendar: Prevent calendar component loading multiple times (bmo#1606375)

- fixed: Calendar: Today pane did not retain width between sessions (bmo#1610207)

- unresolved: When upgrading from Thunderbird version 60 to version 68, add-ons are not automatically updated during the upgrade process. They will however be updated during the add- on update check. It is of course possible to reinstall compatible add-ons via the Add-ons Manager or via addons.thunderbird.net. (bmo#1574183)

- changed: Calendar: Task and Event tree colours adjusted for the dark theme (bmo#1608344)

- fixed: Retrieval of S/MIME certificates from LDAP failed (bmo#1604773)

- fixed: Address-parsing crash on some IMAP servers when preference mail.imap.use_envelope_cmd was set (bmo#1609690)

- fixed: Incorrect forwarding of HTML messages caused SMTP servers to respond with a timeout (bmo#1222046)

- fixed: Calendar: Various parts of the calendar UI stopped working when a second Thunderbird window opened (bmo#1608407)

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected MozillaThunderbird packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1163368

https://bugzilla.opensuse.org/show_bug.cgi?id=1162777

Plugin Details

Severity: High

ID: 133760

File Name: openSUSE-2020-231.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2/18/2020

Updated: 5/8/2020

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:15.1:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:mozillathunderbird:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:mozillathunderbird-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:mozillathunderbird-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:mozillathunderbird-translations-common:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:mozillathunderbird-translations-other:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/18/2020

Vulnerability Publication Date: 3/2/2020

Reference Information

CVE: CVE-2020-6797, CVE-2020-6798, CVE-2020-6800, CVE-2020-6793, CVE-2020-6794, CVE-2020-6795, CVE-2020-6792

IAVA: 2020-A-0072-S