CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
89.7%
Severity: Critical
Date : 2019-02-20
CVE-ID : CVE-2018-18335 CVE-2018-18356 CVE-2018-18509 CVE-2019-5785
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-908
The package thunderbird before version 60.5.1-1 is vulnerable to
multiple issues including arbitrary code execution and insufficient
validation.
Upgrade to 60.5.1-1.
The problems have been fixed upstream in version 60.5.1.
None.
A heap-based buffer overflow has been found in the Skia component of
chromium before 71.0.3578.80 and thunderbird before 60.5.1.
A use-after-free has been found in the Skia component of chromium
before 71.0.3578.80 and firefox before 65.0.1 and thunderbird before
60.5.1.
A flaw during verification of certain S/MIME signatures causes emails
to be shown in Thunderbird before 60.5.1 as having a valid digital
signature, even if the shown message contents aren’t covered by the
signature. The flaw allows an attacker to reuse a valid S/MIME
signature to craft an email message with arbitrary content.
An integer overflow issue has been found in the Skia component of
firefox before 65.0.1 and thunderbird before 60.5.1.
A remote attacker can reuse a valid S/MIME signature to craft an e-mail
message with arbitrary content, and execute arbitrary code through
skia.
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
https://bugs.chromium.org/p/chromium/issues/detail?id=895362
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18335
https://bugzilla.mozilla.org/show_bug.cgi?id=1525815
https://bugs.chromium.org/p/chromium/issues/detail?id=883666
https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2018-18356
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18356
https://bugzilla.mozilla.org/show_bug.cgi?id=1525817
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18509
https://bugzilla.mozilla.org/show_bug.cgi?id=1507218
https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2019-5785
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2019-5785
https://bugzilla.mozilla.org/show_bug.cgi?id=1525433
https://googleprojectzero.blogspot.com/2019/02/the-curious-case-of-convexity-confusion.html
https://security.archlinux.org/CVE-2018-18335
https://security.archlinux.org/CVE-2018-18356
https://security.archlinux.org/CVE-2018-18509
https://security.archlinux.org/CVE-2019-5785
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | thunderbird | < 60.5.1-1 | UNKNOWN |
bugs.chromium.org/p/chromium/issues/detail?id=883666
bugs.chromium.org/p/chromium/issues/detail?id=895362
bugzilla.mozilla.org/show_bug.cgi?id=1507218
bugzilla.mozilla.org/show_bug.cgi?id=1525433
bugzilla.mozilla.org/show_bug.cgi?id=1525815
bugzilla.mozilla.org/show_bug.cgi?id=1525817
chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
googleprojectzero.blogspot.com/2019/02/the-curious-case-of-convexity-confusion.html
security.archlinux.org/AVG-908
security.archlinux.org/CVE-2018-18335
security.archlinux.org/CVE-2018-18356
security.archlinux.org/CVE-2018-18509
security.archlinux.org/CVE-2019-5785
www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2018-18356
www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2019-5785
www.mozilla.org/en-US/security/advisories/mfsa2019-06/
www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18335
www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18356
www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18509
www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2019-5785
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
89.7%