Home / mailings [USN-1748-1] Thunderbird vulnerabilities
Posted on 26 February 2013
Ubuntu Security==========================
==========================
========================
Ubuntu Security Notice USN-1748-1
February 25, 2013
thunderbird vulnerabilities
==========================
==========================
========================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Bobby Holley discovered vulnerabilities in Chrome Object Wrappers (COW) a=
nd
System Only Wrappers (SOW). If a user were tricked into opening a special=
ly
crafted page and had scripting enabled, a remote attacker could exploit
this to bypass security protections to obtain sensitive information or
potentially execute code with the privileges of the user invoking
Thunderbird. (CVE-2013-0773)
Frederik Braun discovered that Thunderbird made the location of the activ=
e
browser profile available to JavaScript workers. Scripting for Thunderbir=
d
is disabled by default in Ubuntu. (CVE-2013-0774)
A use-after-free vulnerability was discovered in Thunderbird. An attacker=
could potentially exploit this to execute code with the privileges of the=
user invoking Thunderbird if scripting were enabled. (CVE-2013-0775)
Michal Zalewski discovered that Thunderbird would not always show the
correct address when cancelling a proxy authentication prompt. A remote
attacker could exploit this to conduct URL spoofing and phishing attacks
if scripting were enabled.
(CVE-2013-0776)
Abhishek Arya discovered several problems related to memory handling. If
the user were tricked into opening a specially crafted page, an attacker
could possibly exploit these to cause a denial of service via application=
crash, or potentially execute code with the privileges of the user invoki=
ng
Thunderbird. (CVE-2013-0777, CVE-2013-0778, CVE-2013-0779, CVE-2013-0780,=
CVE-2013-0781, CVE-2013-0782)
Olli Pettay, Christoph Diehl, Gary Kwong, Jesse Ruderman, Andrew McCreigh=
t,
Joe Drew, Wayne Mery, Alon Zakai, Christian Holler, Gary Kwong, Luke
Wagner, Terrence Cole, Timothy Nikkel, Bill McCloskey, and Nicolas Pierro=
n
discovered multiple memory safety issues affecting Thunderbird. If a user=
had scripting enabled and was tricked into opening a specially crafted
page, an attacker could possibly exploit these to cause a denial of servi=
ce
via application crash. (CVE-2013-0783, CVE-2013-0784)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
thunderbird 17.0.3+build1-0ubuntu0.12.10.1
Ubuntu 12.04 LTS:
thunderbird 17.0.3+build1-0ubuntu0.12.04.1
Ubuntu 11.10:
thunderbird 17.0.3+build1-0ubuntu0.11.10.1
Ubuntu 10.04 LTS:
thunderbird 17.0.3+build1-0ubuntu0.10.04.1
After a standard system update you need to restart Thunderbird to make al=
l
the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1748-1
CVE-2013-0773, CVE-2013-0774, CVE-2013-0775, CVE-2013-0776,
CVE-2013-0777, CVE-2013-0778, CVE-2013-0779, CVE-2013-0780,
CVE-2013-0781, CVE-2013-0782, CVE-2013-0783, CVE-2013-0784,
https://launchpad.net/bugs/1131110
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/17.0.3+build1-0ubuntu0.1=
2.10.1
https://launchpad.net/ubuntu/+source/thunderbird/17.0.3+build1-0ubuntu0.1=
2.04.1
https://launchpad.net/ubuntu/+source/thunderbird/17.0.3+build1-0ubuntu0.1=
1.10.1
https://launchpad.net/ubuntu/+source/thunderbird/17.0.3+build1-0ubuntu0.1=
0.04.1
------------