Lucene search

K
ubuntuUbuntuUSN-4328-1
HistoryApr 13, 2020 - 12:00 a.m.

Thunderbird vulnerabilities

2020-04-1300:00:00
ubuntu.com
52

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.526 Medium

EPSS

Percentile

97.6%

Releases

  • Ubuntu 19.10
  • Ubuntu 18.04 ESM

Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

It was discovered that Message ID calculation was based on uninitialized
data. An attacker could potentially exploit this to obtain sensitive
information. (CVE-2020-6792)

Mutiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted message, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, or execute arbitrary code. (CVE-2020-6793, CVE-2020-6795,
CVE-2020-6822)

It was discovered that if a user saved passwords before Thunderbird 60
and then later set a master password, an unencrypted copy of these
passwords would still be accessible. A local user could exploit this to
obtain sensitive information. (CVE-2020-6794)

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
conduct cross-site scripting (XSS) attacks, obtain sensitive information,
or execute arbitrary code. (CVE-2019-20503, CVE-2020-6798, CVE-2020-6800,
CVE-2020-6805, CVE-2020-6806, CVE-2020-6807, CVE-2020-6812, CVE-2020-6814,
CVE-2020-6819, CVE-2020-6820, CVE-2020-6821, CVE-2020-6825)

It was discovered that the Devtools’ ‘Copy as cURL’ feature did not
fully escape website-controlled data. If a user were tricked in to using
the ‘Copy as cURL’ feature to copy and paste a command with specially
crafted data in to a terminal, an attacker could potentially exploit this
to execute arbitrary commands via command injection. (CVE-2020-6811)

OSVersionArchitecturePackageVersionFilename
Ubuntu19.10noarchthunderbird< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-dbg< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-dev< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-gnome-support< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-gnome-support-dbg< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-locale-af< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-locale-ar< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-locale-ast< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-locale-be< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Ubuntu19.10noarchthunderbird-locale-bg< 1:68.7.0+build1-0ubuntu0.19.10.1UNKNOWN
Rows per page:
1-10 of 1761

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.526 Medium

EPSS

Percentile

97.6%