TencentOS Server 4: thunderbird (TSSA-2024:0669)

high Nessus Plugin ID 239254

Synopsis

The remote TencentOS Server 4 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 4 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2024:0669 advisory.

Package updates are available for TencentOS Server 4 that fix the following vulnerabilities:

CVE-2024-1546:
When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

CVE-2024-0753:
In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVE-2024-0751:
A malicious devtools extension could have been used to escalate privileges. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVE-2024-0750:
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVE-2024-0749:
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVE-2024-0747:
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVE-2024-0746:
A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVE-2024-0742:
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVE-2023-52425:
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20240669.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425

Plugin Details

Severity: High

ID: 239254

File Name: tencentos_TSSA_2024_0669.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:thunderbird, cpe:/o:tencent:tencentos_server:4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/1/2024

Vulnerability Publication Date: 11/1/2024