Lucene search

K
ubuntuUbuntuUSN-5345-1
HistoryMar 23, 2022 - 12:00 a.m.

Thunderbird vulnerabilities

2022-03-2300:00:00
ubuntu.com
77

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.5 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.8%

Releases

  • Ubuntu 21.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
bypass security restrictions, obtain sensitive information, cause
undefined behaviour, spoof the browser UI, or execute arbitrary code.
(CVE-2022-22759, CVE-2022-22760, CVE-2022-22761, CVE-2022-22763,
CVE-2022-22764, CVE-2022-26381, CVE-2022-26383, CVE-2022-26384)

It was discovered that extensions of a particular type could auto-update
themselves and bypass the prompt that requests permissions. If a user
were tricked into installing a specially crafted extension, an attacker
could potentially exploit this to bypass security restrictions.
(CVE-2022-22754)

It was discovered that dragging and dropping an image into a folder could
result in it being marked as executable. If a user were tricked into
dragging and dropping a specially crafted image, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2022-22756)

It was discovered that files downloaded to /tmp were accessible to other
users. A local attacker could exploit this to obtain sensitive
information. (CVE-2022-26386)

A TOCTOU bug was discovered when verifying addon signatures during
install. A local attacker could potentially exploit this to trick a
user into installing an addon with an invalid signature.
(CVE-2022-26387)

An out-of-bounds write by one byte was discovered when processing
messages in some circumstances. If a user were tricked into opening a
specially crafted message, an attacker could potentially exploit this
to cause a denial of service. (CVE-2022-0566)

OSVersionArchitecturePackageVersionFilename
Ubuntu21.10noarchthunderbird< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-dbg< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-dev< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-gnome-support< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-gnome-support-dbg< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-locale-af< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-locale-ar< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-locale-ast< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-locale-be< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchthunderbird-locale-bg< 1:91.7.0+build2-0ubuntu0.21.10.1UNKNOWN
Rows per page:
1-10 of 2731

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.5 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.8%