openSUSE Security Update : MozillaThunderbird (openSUSE-2017-15)

High Nessus Plugin ID 96297

Synopsis

The remote openSUSE host is missing a security update.

Description

This update to Mozilla Thunderbird 45.6.0 fixes security issues and bugs.

In general, these flaws cannot be exploited through email in Thunderbird because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

The following vulnerabilities were fixed: (boo#1015422)

- CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements

- CVE-2016-9895: CSP bypass using marquee tag

- CVE-2016-9897: Memory corruption in libGLES

- CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees

- CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs

- CVE-2016-9904: Cross-origin information leak in shared atoms

- CVE-2016-9905: Crash in EnumerateSubDocuments

- CVE-2016-9893: Memory safety bugs fixed in Thunderbird 45.6

The following bugs were fixed :

- The system integration dialog was shown every time when starting Thunderbird

Solution

Update the affected MozillaThunderbird packages.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=1293985

https://bugzilla.mozilla.org/show_bug.cgi?id=1301381

https://bugzilla.mozilla.org/show_bug.cgi?id=1312272

https://bugzilla.mozilla.org/show_bug.cgi?id=1314442

https://bugzilla.mozilla.org/show_bug.cgi?id=1317409

https://bugzilla.mozilla.org/show_bug.cgi?id=1317936

https://bugzilla.mozilla.org/show_bug.cgi?id=1319122

https://bugzilla.opensuse.org/show_bug.cgi?id=1015422

Plugin Details

Severity: High

ID: 96297

File Name: openSUSE-2017-15.nasl

Version: 3.7

Type: local

Agent: unix

Published: 2017/01/05

Updated: 2019/04/10

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:MozillaThunderbird, p-cpe:/a:novell:opensuse:MozillaThunderbird-buildsymbols, p-cpe:/a:novell:opensuse:MozillaThunderbird-debuginfo, p-cpe:/a:novell:opensuse:MozillaThunderbird-debugsource, p-cpe:/a:novell:opensuse:MozillaThunderbird-devel, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-common, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-other, cpe:/o:novell:opensuse:13.1

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/01/04

Exploitable With

Core Impact

Reference Information

CVE: CVE-2016-9893, CVE-2016-9895, CVE-2016-9897, CVE-2016-9898, CVE-2016-9899, CVE-2016-9900, CVE-2016-9904, CVE-2016-9905