SB2019100908 - Ubuntu update for Thunderbird
Published: October 9, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2019-11739)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error when processing multipart messages. A remote attacker can create a specially crafted multipart/alternative message that can leak encrypted S/MIME parts when included in a a HTML reply/forward.
2) Buffer overflow (CVE-ID: CVE-2019-11740)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary errors when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-11742)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the way the same origin policy is applied to cached images in a combination of SVG filters and a element. A remote attacker can violate same-origin policy and access images from another domain.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-11743)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation of the unload event. A remote attacker can create a specially crafted web page, trick the victim into visiting and gain access to user's history through timing side-channel attacks.
5) Cross-site scripting (CVE-ID: CVE-2019-11744)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within
6) Use-after-free (CVE-ID: CVE-2019-11746)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error while manipulating video elements if the body is freed while still in use. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
7) Use-after-free (CVE-ID: CVE-2019-11752)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when extracting a key value in IndexedDB. A remote attacker can create specially crafted webpage, trick the victim into visiting it, trigger a user-after-free error by deleting the IndexedDB key value and subsequently make the application try to extract it during conversion.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Install update from vendor's website.