Lucene search

K

Thunderbird ESR < 60.7.XXX - parser_get_next_char Heap-Based Buffer Overflow Vulnerability

🗓️ 18 Jun 2019 00:00:00Reported by X41Type 
zdt
 zdt
🔗 0day.today👁 233 Views

Thunderbird ESR 60.7.XXX - Heap-Based Buffer Overflow Vulnerabilit

Show more
Related
Code
ReporterTitlePublishedViews
Family
CVE
CVE-2019-11703
23 Jul 201914:15
cve
Veracode
Denial Of Service (DoS)
1 Jul 201900:15
veracode
Cvelist
CVE-2019-11703
23 Jul 201913:20
cvelist
exploitpack
Thunderbird ESR 60.7.XXX - parser_get_next_char Heap-Based Buffer Overflow
17 Jun 201900:00
exploitpack
UbuntuCve
CVE-2019-11703
14 Jun 201900:00
ubuntucve
Exploit DB
Thunderbird ESR &lt; 60.7.XXX - &#039;parser_get_next_char&#039; Heap-Based Buffer Overflow
17 Jun 201900:00
exploitdb
Prion
Heap overflow
23 Jul 201914:15
prion
RedhatCVE
CVE-2019-11703
29 Mar 202001:56
redhatcve
NVD
CVE-2019-11703
23 Jul 201914:15
nvd
Debian CVE
CVE-2019-11703
23 Jul 201914:15
debiancve
Rows per page

Heap-based buffer overflow in Thunderbird
=========================================
Severity Rating: High
Confirmed Affected Versions: All versions affected
Confirmed Patched Versions: Thunderbird ESR 60.7.XXX
Vendor: Thunderbird
Vendor URL: https://www.thunderbird.net/
Vendor Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=1553820
Vector: Incoming mail with calendar attachment
Credit: X41 D-SEC GmbH, Luis Merino
Status: Public
CVE: CVE-2019-11703
CWE: 122
CVSS Score: 7.8
CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O
Advisory-URL: https://www.x41-dsec.de/lab/advisories/x41-2019-002-thunderbird

Summary and Impact
==================
A heap-based buffer overflow has been identified in the Thunderbird email
client. The issue is present in the libical implementation, which was forked
from upstream libical version 0.47.
The issue can be triggered remotely, when an attacker sends an specially
crafted calendar attachment and does not require user interaction. It
might be used by a remote attacker to crash or gain remote code execution
in the client system.
This issue was initially reported by Brandon Perry here:
https://bugzilla.mozilla.org/show_bug.cgi?id=1281041
and fixed in libical upstream, but was never fixed in Thunderbird.
X41 did not perform a full test or audit on the software.

Product Description
===================
Thunderbird is a free and open source email, newsfeed, chat, and calendaring
client, that's easy to set up and customize.

Analysis
========
A heap-based buffer overflow in icalparser.c parser_get_next_char()
can be triggered while parsing a calendar attachment containing a malformed
or specially crafted string.
The issue initially manifests with out of bounds read, but we don't discard
it could later lead to out of bounds write.
It is expected that an attacker can exploit this vulnerability to achieve
remote code execution.

Proof of Concept
================
A reproducer ical file can be found in https://github.com/x41sec/advisories/tree/master/X41-2019-002

Workarounds
===========
A fix is available from upstream. Alternatively, libical can be replaced by icaljs,
a JavaScript implementation of ical parsing, by setting 
calendar.icaljs = true in Thunderbird configuration. 

Timeline
========
2016-06-20 Issue reported by Brandon Perry to the vendor
2019-05-23 Issues reported to the vendor
2019-05-23 Vendor reply
2019-06-12 CVE IDs assigned
2019-06-13 Patched Version released
2019-06-13 Advisory released

About X41 D-SEC GmbH
====================
X41 is an expert provider for application security services.
Having extensive industry experience and expertise in the area of information
security, a strong core security team of world class security experts enables
X41 to perform premium security services.
Fields of expertise in the area of application security are security centered
code reviews, binary reverse engineering and vulnerability discovery.
Custom research and a IT security consulting and support services are core
competencies of X41.


Proof of Concept:
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47003.zip

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Jun 2019 00:00Current
9.7High risk
Vulners AI Score9.7
CVSS27.5
CVSS39.8
EPSS0.08052
233
.json
Report