Lucene search

K
centosCentOS ProjectCESA-2019:1624
HistoryJul 01, 2019 - 3:57 p.m.

thunderbird security update

2019-07-0115:57:35
CentOS Project
lists.centos.org
98

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.809

Percentile

98.4%

CentOS Errata and Security Advisory CESA-2019:1624

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 60.7.2.

Security Fix(es):

  • Mozilla: Type confusion in Array.pop (CVE-2019-11707)

  • thunderbird: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c (CVE-2019-11705)

  • Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708)

  • thunderbird: Heap buffer over read in icalparser.c parser_get_next_char (CVE-2019-11703)

  • thunderbird: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c (CVE-2019-11704)

  • thunderbird: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c (CVE-2019-11706)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2019-July/085509.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2019:1624

OSVersionArchitecturePackageVersionFilename
CentOS6i686thunderbird< 60.7.2-2.el6.centosthunderbird-60.7.2-2.el6.centos.i686.rpm
CentOS6x86_64thunderbird< 60.7.2-2.el6.centosthunderbird-60.7.2-2.el6.centos.x86_64.rpm

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.809

Percentile

98.4%