Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202005-7: thunderbird: multiple issues

    Date
    154
    Posted By
    The package thunderbird before version 68.8.0-1 is vulnerable to multiple issues including arbitrary code execution and content spoofing.
    Arch Linux Security Advisory ASA-202005-7
    =========================================
    
    Severity: Critical
    Date    : 2020-05-09
    CVE-ID  : CVE-2020-6831  CVE-2020-12387 CVE-2020-12392 CVE-2020-12395
              CVE-2020-12397
    Package : thunderbird
    Type    : multiple issues
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1155
    
    Summary
    =======
    
    The package thunderbird before version 68.8.0-1 is vulnerable to
    multiple issues including arbitrary code execution and content
    spoofing.
    
    Resolution
    ==========
    
    Upgrade to 68.8.0-1.
    
    # pacman -Syu "thunderbird>=68.8.0-1"
    
    The problems have been fixed upstream in version 68.8.0.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2020-6831 (arbitrary code execution)
    
    A buffer overflow could occur when parsing and validating SCTP chunks
    in WebRTC, in Firefox before 76.0, Thunderbird before 68.8.0 and
    chromium before 81.0.4044.138. This could have led to memory corruption
    and a potentially exploitable crash.
    
    - CVE-2020-12387 (arbitrary code execution)
    
    A race condition has been found in Firefox before 76.0 and Thunderbird
    before 68.8.0, when running shutdown code for Web Worker, leading to a
    use-after-free vulnerability. This results in a potentially exploitable
    crash.
    
    - CVE-2020-12392 (content spoofing)
    
    The 'Copy as cURL' feature of Devtools' network tab did not properly
    escape the HTTP POST data of a request in Firefox before 76.0 and
    Thunderbird before 68.8.0, which can be controlled by the website. If a
    user used the 'Copy as cURL' feature and pasted the command into a
    terminal, it could have resulted in the disclosure of local files.
    
    - CVE-2020-12395 (arbitrary code execution)
    
    Several memory safety bugs has been found in Firefox before 76.0,
    Firefox ESR before 68.8 and Thunderbird before 68.8.0. Some of these
    bugs showed evidence of memory corruption and Mozilla presumes that
    with enough effort some of these could have been exploited to run
    arbitrary code.
    
    - CVE-2020-12397 (content spoofing)
    
    An spoofing email address issue has been found in Thunderbird before
    68.8.0. By encoding Unicode whitespace characters within the From email
    header, an attacker can spoof the sender email address that Thunderbird
    displays.
    
    Impact
    ======
    
    A remote attacker can spoof an e-mail address and execute arbitrary
    code on the affected host.
    
    References
    ==========
    
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/
    https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
    https://crbug.com/1073602
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-6831
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/#CVE-2020-6831
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12387
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/#CVE-2020-12387
    https://bugzilla.mozilla.org/show_bug.cgi?id=1545345
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12392
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/#CVE-2020-12392
    https://bugzilla.mozilla.org/show_bug.cgi?id=1614468
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-12395
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/#CVE-2020-12395
    https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595886%2C1611482%2C1614704%2C1624098%2C1625749%2C1626382%2C1628076%2C1631508
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/#CVE-2020-12397
    https://bugzilla.mozilla.org/show_bug.cgi?id=1617370
    https://security.archlinux.org/CVE-2020-6831
    https://security.archlinux.org/CVE-2020-12387
    https://security.archlinux.org/CVE-2020-12392
    https://security.archlinux.org/CVE-2020-12395
    https://security.archlinux.org/CVE-2020-12397
    
    

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.