Lucene search

K
ubuntuUbuntuUSN-2673-1
HistoryJul 20, 2015 - 12:00 a.m.

Thunderbird vulnerabilities

2015-07-2000:00:00
ubuntu.com
55

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

6.9 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Releases

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04

Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

Karthikeyan Bhargavan discovered that NSS incorrectly handled state
transitions for the TLS state machine. If a remote attacker were able to
perform a machine-in-the-middle attack, this flaw could be exploited to skip
the ServerKeyExchange message and remove the forward-secrecy property.
(CVE-2015-2721)

Bob Clary, Christian Holler, Bobby Holley, and Andrew McCreight discovered
multiple memory safety issues in Thunderbird. If a user were tricked in to
opening a specially crafted website in a browsing context, an attacker
could potentially exploit these to cause a denial of service via
application crash, or execute arbitrary code with the privileges of the
user invoking Thunderbird. (CVE-2015-2724)

Ronald Crane discovered multiple security vulnerabilities. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service
via application crash, or execute arbitrary code with the privileges of
the user invoking Thunderbird. (CVE-2015-2734, CVE-2015-2735,
CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740)

Matthew Green discovered a DHE key processing issue in NSS where a MITM
could force a server to downgrade TLS connections to 512-bit export-grade
cryptography. An attacker could potentially exploit this to impersonate
the server. (CVE-2015-4000)

OSVersionArchitecturePackageVersionFilename
Ubuntu15.04noarchthunderbird< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-dbg< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-dbgsym< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-dev< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-dev-dbgsym< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-globalmenu< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-gnome-support< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-gnome-support-dbg< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-locale-af< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Ubuntu15.04noarchthunderbird-locale-ar< 1:31.8.0+build1-0ubuntu0.15.04.1UNKNOWN
Rows per page:
1-10 of 2961

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

6.9 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%