Home / mailingsPDF  

[USN-1681-2] Thunderbird vulnerabilities

Posted on 09 January 2013
Ubuntu Security

==========================
==========================
========================
Ubuntu Security Notice USN-1681-2
January 09, 2013

thunderbird vulnerabilities
==========================
==========================
========================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in Thunderbird.

Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client

Details:

USN-1681-1 fixed vulnerabilities in Firefox. This update provides the
corresponding updates for Thunderbird.

Original advisory details:

Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill
Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman=
,
and Julian Seward discovered multiple memory safety issues affecting
Firefox. If the user were tricked into opening a specially crafted page,=
an
attacker could possibly exploit these to cause a denial of service via
application crash, or potentially execute code with the privileges of th=
e
user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)

Abhishek Arya discovered several user-after-free and buffer overflows in=

Firefox. An attacker could exploit these to cause a denial of service vi=
a
application crash, or potentially execute code with the privileges of th=
e
user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,
CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-582=
9)

A stack buffer was discovered in Firefox. If the user were tricked into
opening a specially crafted page, an attacker could possibly exploit thi=
s
to cause a denial of service via application crash, or potentially execu=
te
code with the privileges of the user invoking Firefox. (CVE-2013-0768)

Masato Kinugawa discovered that Firefox did not always properly display =
URL
values in the address bar. A remote attacker could exploit this to condu=
ct
URL spoofing and phishing attacks. (CVE-2013-0759)

Atte Kettunen discovered that Firefox did not properly handle HTML table=
s
with a large number of columns and column groups. If the user were trick=
ed
into opening a specially crafted page, an attacker could exploit this to=

cause a denial of service via application crash, or potentially execute
code with the privileges of the user invoking Firefox. (CVE-2013-0744)

Jerry Baker discovered that Firefox did not always properly handle
threading when performing downloads over SSL connections. An attacker co=
uld
exploit this to cause a denial of service via application crash.
(CVE-2013-0764)

Olli Pettay and Boris Zbarsky discovered flaws in the Javacript engine o=
f
Firefox. An attacker could cause a denial of service via application cra=
sh,
or potentially execute code with the privileges of the user invoking
Firefox. (CVE-2013-0745, CVE-2013-0746)

Jesse Ruderman discovered a flaw in the way Firefox handled plugins. If=
a
user were tricked into opening a specially crafted page, a remote attack=
er
could exploit this to bypass security protections to conduct clickjackin=
g
attacks. (CVE-2013-0747)

Jesse Ruderman discovered an information leak in Firefox. An attacker co=
uld
exploit this to reveal memory address layout which could help in bypassi=
ng
ASLR protections. (CVE-2013-0748)

An integer overflow was discovered in the Javascript engine, leading to =
a
heap-based buffer overflow. If the user were tricked into opening a
specially crafted page, an attacker could possibly exploit this to execu=
te
code with the privileges of the user invoking Firefox. (CVE-2013-0750)

Sviatoslav Chagaev discovered that Firefox did not properly handle XBL
files with multiple XML bindings with SVG content. An attacker could cau=
se
a denial of service via application crash, or potentially execute code w=
ith
the privileges of the user invoking Firefox. (CVE-2013-0752)

Mariusz Mlynski discovered two flaws to gain access to privileged chrome=

functions. An attacker could possibly exploit this to execute code with =
the
privileges of the user invoking Firefox. (CVE-2013-0757, CVE-2013-0758)

Several use-after-free issues were discovered in Firefox. If the user we=
re
tricked into opening a specially crafted page, an attacker could possibl=
y
exploit this to execute code with the privileges of the user invoking
Firefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756)

Two intermediate CA certificates were mis-issued by the TURKTRUST
certificate authority. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could be exploited to view sensitive=

information. (CVE-2013-0743)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
thunderbird 17.0.2+build1-0ubuntu0.12.10.1

Ubuntu 12.04 LTS:
thunderbird 17.0.2+build1-0ubuntu0.12.04.1

Ubuntu 11.10:
thunderbird 17.0.2+build1-0ubuntu0.11.10.1

Ubuntu 10.04 LTS:
thunderbird 17.0.2+build1-0ubuntu0.10.04.1

After a standard system update you need to restart Thunderbird to make al=
l
the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1681-2
http://www.ubuntu.com/usn/usn-1681-1
CVE-2012-5829, CVE-2013-0743, CVE-2013-0744, CVE-2013-0745,
CVE-2013-0746, CVE-2013-0747, CVE-2013-0748, CVE-2013-0749,
CVE-2013-0750, CVE-2013-0752, CVE-2013-0753, CVE-2013-0754,
CVE-2013-0755, CVE-2013-0756, CVE-2013-0757, CVE-2013-0758,
CVE-2013-0759, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,
CVE-2013-0763, CVE-2013-0764, CVE-2013-0766, CVE-2013-0767,
CVE-2013-0768, CVE-2013-0769, CVE-2013-0770, CVE-2013-0771,
https://launchpad.net/bugs/1096456

Package Information:

https://launchpad.net/ubuntu/+source/thunderbird/17.0.2+build1-0ubuntu0.1=
2.10.1

https://launchpad.net/ubuntu/+source/thunderbird/17.0.2+build1-0ubuntu0.1=
2.04.1

https://launchpad.net/ubuntu/+source/thunderbird/17.0.2+build1-0ubuntu0.1=
1.10.1

https://launchpad.net/ubuntu/+source/thunderbird/17.0.2+build1-0ubuntu0.1=
0.04.1





------------

 

TOP