Lucene search

K
redhatRedHatRHSA-2021:1353
HistoryApr 26, 2021 - 5:03 a.m.

(RHSA-2021:1353) Important: thunderbird security update

2021-04-2605:03:41
CWE-190
access.redhat.com
105
mozilla thunderbird standlone mail out of bound write responsive design mode network hosts secure lock icon blob urls ftp command execution webassembly jit port race condition disk verification_

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

82.4%

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.10.0.

Security Fix(es):

  • Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994)

  • Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995)

  • Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961)

  • Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998)

  • Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999)

  • Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002)

  • Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945)

  • Mozilla: Port blocking could be bypassed (CVE-2021-29946)

  • Mozilla: Race condition when reading from disk while verifying signatures (CVE-2021-29948)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected configurations

Vulners
Node
redhatthunderbirdRange78.10.0-1.el7_9
OR
redhatthunderbirdRange78.10.0-1.el8_3
OR
redhatthunderbird-0Range78.10.0-1.el8_1
OR
redhatthunderbird-0Range78.10.0-1.el8_2
OR
redhatfirefoxRange78.10.0-1.el7_9
OR
redhatfirefoxRange78.10.0-1.el8_3
OR
redhatfirefox-0Range78.10.0-1.el8_1
OR
redhatfirefox-0Range78.10.0-1.el8_2
AND
redhatenterprise_linuxMatch7
OR
redhatenterprise_linuxMatch8
VendorProductVersionCPE
redhatthunderbird*cpe:2.3:a:redhat:thunderbird:*:*:*:*:*:*:*:*
redhatthunderbird-0*cpe:2.3:a:redhat:thunderbird-0:*:*:*:*:*:*:*:*
redhatfirefox*cpe:2.3:a:redhat:firefox:*:*:*:*:*:*:*:*
redhatfirefox-0*cpe:2.3:a:redhat:firefox-0:*:*:*:*:*:*:*:*
redhatenterprise_linux7cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*
redhatenterprise_linux8cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

82.4%