Lucene search

K
ubuntuUbuntuUSN-6717-1
HistoryMar 26, 2024 - 12:00 a.m.

Thunderbird vulnerabilities

2024-03-2600:00:00
ubuntu.com
25
thunderbird
ubuntu
security vulnerabilities
denial of service
sensitive information
arbitrary code

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

42.0%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2024-0743, CVE-2024-2611,
CVE-2024-2614)

Hubert Kario discovered that Thunderbird had a timing side-channel when
performing RSA decryption. A remote attacker could possibly use this
issue to recover sensitive information. (CVE-2023-5388)

Gary Kwong discovered that Thunderbird incorrectly updated return
registers for JIT code on Armv7-A systems. An attacker could potentially
exploit this issue to execute arbitrary code. (CVE-2024-2607)

Ronald Crane discovered that Thunderbird did not properly manage memory
during character encoding. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2024-2608)

Georg Felber and Marco Squarcina discovered that Thunderbird incorrectly
handled html and body tags. An attacker who was able to inject markup into
a page otherwise protected by a Content Security Policy may have been able
obtain sensitive information. (CVE-2024-2610)

Ronald Crane discovered a use-after-free in Thunderbird when handling code
in SafeRefPtr. An attacker could potentially exploit this issue to cause a
denial of service, or execute arbitrary code. (CVE-2024-2612)

Ryan VanderMeulen and Dan Minor discovered that Thunderbird did not
properly manage memory conditions in ICU. An attacker could potentially
exploit this issue to cause a denial of service. (CVE-2024-2616)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchthunderbird< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-dbg< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-dev< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-gnome-support< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-gnome-support-dbg< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-af< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-ar< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-ast< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-be< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-bg< 1:115.9.0+build1-0ubuntu0.23.10.1UNKNOWN
Rows per page:
1-10 of 2731

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

42.0%