Lucene search

K
mageiaGentoo FoundationMGASA-2020-0378
HistorySep 30, 2020 - 1:01 p.m.

Updated Thunderbird packages fix security vulnerabilities

2020-09-3013:01:40
Gentoo Foundation
advisories.mageia.org
19

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

77.7%

AppCache manifest poisoning due to url encoded character processing (CVE-2020-12415). Use-after-free in WebRTC VideoBroadcaster (CVE-2020-12416). Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422). WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424). Out of bound read in Date.parse() (CVE-2020-12425). Memory safety bugs fixed in Thunderbird 78 (CVE-2020-12426). X-Frame-Options bypass using object or embed tags (CVE-2020-15648). Memory safety bugs fixed in Thunderbird 78.3 (CVE-2020-15673). XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676). Download origin spoofing via redirect (CVE-2020-15677). When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678). Note that Enigmail will no longer let you manage your PGP keys, but instead will only provide a migration tool. Thunderbird will no longer use the system keyring and GnuPG; instead, it will handle PGP keys internally. To use your existing PGP keys with Thunderbird 78 and above, you must use the migration tool from Enigmail upon the first Thunderbird run. See the migration notes on the Mageia wiki. Also note that, to protect your keys, you should define a master password in Thunderbird.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

77.7%