9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.935 High
EPSS
Percentile
99.1%
Severity: Critical
Date : 2017-01-29
CVE-ID : CVE-2017-5373 CVE-2017-5375 CVE-2017-5376 CVE-2017-5378
CVE-2017-5380 CVE-2017-5383 CVE-2017-5390 CVE-2017-5396
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-158
The package thunderbird before version 45.7.0-1 is vulnerable to
multiple issues including arbitrary code execution, information
disclosure, privilege escalation and content spoofing.
Upgrade to 45.7.0-1.
The problems have been fixed upstream in version 45.7.0.
None.
Several memory safety bugs have been found in Firefox < 51 and
Thunderbird < 47.5. Some of these bugs showed evidence of memory
corruption and we presume that with enough effort that some of these
could be exploited to run arbitrary code.
JIT code allocation in Firefox < 51 and Thunderbird < 45.7 can allow
for a bypass of ASLR and DEP protections leading to potential memory
corruption attacks.
A use-after-free vulnerability has been found in Firefox < 51 and
Thunderbird < 45.7, while manipulating XSL in XSLT documents.
An information disclosure vulnerability has been found in Firefox < 51
and Thunderbird < 45.7, where hashed codes of JavaScript objects are
shared between pages. This allows for pointer leaks because an object’s
address can be discovered through hash codes, and also allows for data
leakage of an object’s content using these hash codes.
A potential use-after-free vulnerability during DOM manipulation of SVG
content has been in Firefox < 51 and Thunderbird < 45.7.
URLs containing certain unicode glyphs for alternative hyphens and
quotes do not properly trigger punycode display in Firefox < 51 and
Thunderbird < 45.7, allowing for domain name spoofing attacks in the
location bar.
The JSON viewer in the Developer Tools in Firefox < 51 and Thunderbird
< 45.7 uses insecure methods to create a communication channel for
copying and viewing JSON or HTTP headers data, allowing for potential
privilege escalation.
A use-after-free vulnerability has been found in the Media Decoder of
Firefox < 51 and Thunderbird < 45.7, when working with media files when
some events are fired after the media elements are freed from memory.
A remote attacker can access sensitive information, spoof content,
escalate privileges and execute arbitrary code on the affected host.
https://www.mozilla.org/en-US/security/advisories/mfsa2017-03
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5373
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375
https://bugzilla.mozilla.org/show_bug.cgi?id=1325200
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5376
https://bugzilla.mozilla.org/show_bug.cgi?id=1311687
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378
https://bugzilla.mozilla.org/show_bug.cgi?id=1312001
https://bugzilla.mozilla.org/show_bug.cgi?id=1330769
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5380
https://bugzilla.mozilla.org/show_bug.cgi?id=1322107
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5383
https://bugzilla.mozilla.org/show_bug.cgi?id=1323338
https://bugzilla.mozilla.org/show_bug.cgi?id=1324716
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5390
https://bugzilla.mozilla.org/show_bug.cgi?id=1297361
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5396
https://bugzilla.mozilla.org/show_bug.cgi?id=1329403
https://security.archlinux.org/CVE-2017-5373
https://security.archlinux.org/CVE-2017-5375
https://security.archlinux.org/CVE-2017-5376
https://security.archlinux.org/CVE-2017-5378
https://security.archlinux.org/CVE-2017-5380
https://security.archlinux.org/CVE-2017-5383
https://security.archlinux.org/CVE-2017-5390
https://security.archlinux.org/CVE-2017-5396
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | thunderbird | < 45.7.0-1 | UNKNOWN |
bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877
bugzilla.mozilla.org/show_bug.cgi?id=1297361
bugzilla.mozilla.org/show_bug.cgi?id=1311687
bugzilla.mozilla.org/show_bug.cgi?id=1312001
bugzilla.mozilla.org/show_bug.cgi?id=1322107
bugzilla.mozilla.org/show_bug.cgi?id=1323338
bugzilla.mozilla.org/show_bug.cgi?id=1324716
bugzilla.mozilla.org/show_bug.cgi?id=1325200
bugzilla.mozilla.org/show_bug.cgi?id=1329403
bugzilla.mozilla.org/show_bug.cgi?id=1330769
security.archlinux.org/AVG-158
security.archlinux.org/CVE-2017-5373
security.archlinux.org/CVE-2017-5375
security.archlinux.org/CVE-2017-5376
security.archlinux.org/CVE-2017-5378
security.archlinux.org/CVE-2017-5380
security.archlinux.org/CVE-2017-5383
security.archlinux.org/CVE-2017-5390
security.archlinux.org/CVE-2017-5396
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5373
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5376
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5380
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5383
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5390
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5396
www.mozilla.org/en-US/security/advisories/mfsa2017-03
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.935 High
EPSS
Percentile
99.1%