CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
79.3%
Issue Overview:
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (CVE-2020-6463)
By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1. (CVE-2020-15652)
Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1. (CVE-2020-15659)
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream. (CVE-2020-6514)
Affected Packages:
thunderbird
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update thunderbird to update your system.
New Packages:
aarch64:
thunderbird-68.11.0-1.amzn2.aarch64
thunderbird-debuginfo-68.11.0-1.amzn2.aarch64
src:
thunderbird-68.11.0-1.amzn2.src
x86_64:
thunderbird-68.11.0-1.amzn2.x86_64
thunderbird-debuginfo-68.11.0-1.amzn2.x86_64
Red Hat: CVE-2020-15652, CVE-2020-15659, CVE-2020-6463, CVE-2020-6514
Mitre: CVE-2020-15652, CVE-2020-15659, CVE-2020-6463, CVE-2020-6514
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | thunderbird | < 68.11.0-1.amzn2 | thunderbird-68.11.0-1.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | thunderbird-debuginfo | < 68.11.0-1.amzn2 | thunderbird-debuginfo-68.11.0-1.amzn2.aarch64.rpm |
Amazon Linux | 2 | x86_64 | thunderbird | < 68.11.0-1.amzn2 | thunderbird-68.11.0-1.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | thunderbird-debuginfo | < 68.11.0-1.amzn2 | thunderbird-debuginfo-68.11.0-1.amzn2.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
79.3%