Lucene search

K
archlinuxArchLinuxASA-202105-29
HistoryMay 25, 2021 - 12:00 a.m.

[ASA-202105-29] thunderbird: multiple issues

2021-05-2500:00:00
security.archlinux.org
196

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

43.9%

Arch Linux Security Advisory ASA-202105-29

Severity: Low
Date : 2021-05-25
CVE-ID : CVE-2021-29956 CVE-2021-29957
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1964

Summary

The package thunderbird before version 78.10.2-1 is vulnerable to
multiple issues including content spoofing and information disclosure.

Resolution

Upgrade to 78.10.2-1.

pacman -Syu “thunderbird>=78.10.2-1”

The problems have been fixed upstream in version 78.10.2.

Workaround

None.

Description

  • CVE-2021-29956 (information disclosure)

OpenPGP secret keys that were imported using Thunderbird version 78.8.1
up to version 78.10.1 were stored unencrypted on the user’s local disk.
The master password protection was inactive for those keys. Version
78.10.2 will restore the protection mechanism for newly imported keys,
and will automatically protect keys that had been imported using
affected Thunderbird versions. This vulnerability affects Thunderbird <
78.10.2.

  • CVE-2021-29957 (content spoofing)

If a MIME encoded email contains an OpenPGP inline signed or encrypted
message part, but also contains an additional unprotected part,
Thunderbird did not indicate that only parts of the message are
protected. This vulnerability affects Thunderbird < 78.10.2.

Impact

OpenPGP secret keys were store unencrypted on disk, allowing for
potential local exfiltration. Additionally, a remote attacker could
inject unprotected parts into OpenPGP signed or encrypted messages in
order to spoof content.

References

https://www.mozilla.org/security/advisories/mfsa2021-22/
https://bugzilla.mozilla.org/show_bug.cgi?id=1710290
https://bugzilla.mozilla.org/show_bug.cgi?id=1673241
https://security.archlinux.org/CVE-2021-29956
https://security.archlinux.org/CVE-2021-29957

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanythunderbird< 78.10.2-1UNKNOWN

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

43.9%