SB2020073022 - Multiple vulnerabilities in Mozilla Thunderbird
Published: July 30, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2020-15652)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in stack trace for JavaScript errors. A remote attacker can obtain result of a cross-origin redirect.
2) Improperly implemented security check for standard (CVE-ID: CVE-2020-6514)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to WebRTC used the memory address of a class instance as a connection identifier. A remote attacker can use the obtained value to bypass ASLR protection.3) Information disclosure (CVE-ID: CVE-2020-15655)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists in the Extension APIs. A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-15653)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to application does not properly impose security restrictions, when allowing popups. A remote attacker can create a specially crafted web page with noopener links that may allow an attacker to bypass iframe sandbox for websites relying on sandbox configurations, if allow-popups flag is set.
5) Use-after-free (CVE-ID: CVE-2020-6463)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error in ANGLE in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a heap-based buffer overflow and execute arbitrary code on the system.
6) Type Confusion (CVE-ID: CVE-2020-15656)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error when JIT optimizations involving the Javascript arguments object could confuse later optimizations in IonMonkey. A remote attacker can pass specially crafted data to the application, trigger a type confusion error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Input validation error (CVE-ID: CVE-2020-15658)
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to insufficient validation of special characters during file download,
which led to an attacker being able to cut off the file ending at an
earlier position, leading to a different file type being downloaded than
shown in the dialog. A remote attacker can override file type when saving data to disk.
8) Insecure DLL loading (CVE-ID: CVE-2020-15657)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the application loads DLL libraries in an insecure manner from the installation directory. A remote attacker can place a specially crafted .dll file into directory, from which Firefox is being installed, trick the victim into launching the Firefox installer and execute arbitrary code on the system.
9) Resource management error (CVE-ID: CVE-2020-15654)
The vulnerability allows a remote attacker to bypass certain security restrictions.
When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work.
10) Buffer overflow (CVE-ID: CVE-2020-15659)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.