This update to Mozilla Thunderbird 45.6.0 fixes security issues and bugs.
In general, these flaws cannot be exploited through email in Thunderbird because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
The following vulnerabilities were fixed: (boo#1015422)
CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
CVE-2016-9895: CSP bypass using marquee tag
CVE-2016-9897: Memory corruption in libGLES
CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
CVE-2016-9904: Cross-origin information leak in shared atoms
CVE-2016-9905: Crash in EnumerateSubDocuments
CVE-2016-9893: Memory safety bugs fixed in Thunderbird 45.6
The following bugs were fixed :
The system integration dialog was shown every time when starting Thunderbird
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2017-15.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(96297);
script_version("3.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2016-9893", "CVE-2016-9895", "CVE-2016-9897", "CVE-2016-9898", "CVE-2016-9899", "CVE-2016-9900", "CVE-2016-9904", "CVE-2016-9905");
script_name(english:"openSUSE Security Update : MozillaThunderbird (openSUSE-2017-15)");
script_summary(english:"Check for the openSUSE-2017-15 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"This update to Mozilla Thunderbird 45.6.0 fixes security issues and
bugs.
In general, these flaws cannot be exploited through email in
Thunderbird because scripting is disabled when reading mail,
but are potentially risks in browser or browser-like
contexts.
The following vulnerabilities were fixed: (boo#1015422)
- CVE-2016-9899: Use-after-free while manipulating DOM
events and audio elements
- CVE-2016-9895: CSP bypass using marquee tag
- CVE-2016-9897: Memory corruption in libGLES
- CVE-2016-9898: Use-after-free in Editor while
manipulating DOM subtrees
- CVE-2016-9900: Restricted external resources can be
loaded by SVG images through data URLs
- CVE-2016-9904: Cross-origin information leak in shared
atoms
- CVE-2016-9905: Crash in EnumerateSubDocuments
- CVE-2016-9893: Memory safety bugs fixed in Thunderbird
45.6
The following bugs were fixed :
- The system integration dialog was shown every time when
starting Thunderbird"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1293985"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1301381"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1312272"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1314442"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1317409"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1317936"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1319122"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1015422"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected MozillaThunderbird packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaThunderbird");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaThunderbird-buildsymbols");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaThunderbird-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaThunderbird-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaThunderbird-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-other");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
script_set_attribute(attribute:"patch_publication_date", value:"2017/01/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/01/05");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaThunderbird-45.6.0-70.95.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaThunderbird-buildsymbols-45.6.0-70.95.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaThunderbird-debuginfo-45.6.0-70.95.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaThunderbird-debugsource-45.6.0-70.95.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaThunderbird-devel-45.6.0-70.95.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaThunderbird-translations-common-45.6.0-70.95.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaThunderbird-translations-other-45.6.0-70.95.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "MozillaThunderbird / MozillaThunderbird-buildsymbols / etc");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | opensuse | mozillathunderbird | p-cpe:/a:novell:opensuse:mozillathunderbird |
novell | opensuse | mozillathunderbird-buildsymbols | p-cpe:/a:novell:opensuse:mozillathunderbird-buildsymbols |
novell | opensuse | mozillathunderbird-debuginfo | p-cpe:/a:novell:opensuse:mozillathunderbird-debuginfo |
novell | opensuse | mozillathunderbird-debugsource | p-cpe:/a:novell:opensuse:mozillathunderbird-debugsource |
novell | opensuse | mozillathunderbird-devel | p-cpe:/a:novell:opensuse:mozillathunderbird-devel |
novell | opensuse | mozillathunderbird-translations-common | p-cpe:/a:novell:opensuse:mozillathunderbird-translations-common |
novell | opensuse | mozillathunderbird-translations-other | p-cpe:/a:novell:opensuse:mozillathunderbird-translations-other |
novell | opensuse | 13.1 | cpe:/o:novell:opensuse:13.1 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905
bugzilla.mozilla.org/show_bug.cgi?id=1293985
bugzilla.mozilla.org/show_bug.cgi?id=1301381
bugzilla.mozilla.org/show_bug.cgi?id=1312272
bugzilla.mozilla.org/show_bug.cgi?id=1314442
bugzilla.mozilla.org/show_bug.cgi?id=1317409
bugzilla.mozilla.org/show_bug.cgi?id=1317936
bugzilla.mozilla.org/show_bug.cgi?id=1319122
bugzilla.opensuse.org/show_bug.cgi?id=1015422