Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2021-29969 CVE-2021-29970 CVE-2021-29976 CVE-2021-30547 |
CWE-ID | CWE-77 CWE-416 CWE-119 CWE-787 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Workstation Extension Operating systems & Components / Operating system MozillaThunderbird-translations-other Operating systems & Components / Operating system package or component MozillaThunderbird-translations-common Operating systems & Components / Operating system package or component MozillaThunderbird-debugsource Operating systems & Components / Operating system package or component MozillaThunderbird-debuginfo Operating systems & Components / Operating system package or component MozillaThunderbird Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU54829
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-29969
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary commands.
The vulnerability exists in the way Thunderbird handles IMAP server responses sent prior to STARTTLS process. A remote attacker with ability to perform MitM attack can send arbitrary IMAP commands before the STARTTLS handshake and execute them after the handshake is complete.
This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.12.0-8.33.1
MozillaThunderbird-translations-common: before 78.12.0-8.33.1
MozillaThunderbird-debugsource: before 78.12.0-8.33.1
MozillaThunderbird-debuginfo: before 78.12.0-8.33.1
MozillaThunderbird: before 78.12.0-8.33.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212458-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54678
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-29970
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in accessibility features when processing HTML content. A remote attacker can track the victim to open a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.12.0-8.33.1
MozillaThunderbird-translations-common: before 78.12.0-8.33.1
MozillaThunderbird-debugsource: before 78.12.0-8.33.1
MozillaThunderbird-debuginfo: before 78.12.0-8.33.1
MozillaThunderbird: before 78.12.0-8.33.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212458-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54679
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-29976
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.12.0-8.33.1
MozillaThunderbird-translations-common: before 78.12.0-8.33.1
MozillaThunderbird-debugsource: before 78.12.0-8.33.1
MozillaThunderbird-debuginfo: before 78.12.0-8.33.1
MozillaThunderbird: before 78.12.0-8.33.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212458-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54002
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-30547
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted HTML content in ANGLE. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.12.0-8.33.1
MozillaThunderbird-translations-common: before 78.12.0-8.33.1
MozillaThunderbird-debugsource: before 78.12.0-8.33.1
MozillaThunderbird-debuginfo: before 78.12.0-8.33.1
MozillaThunderbird: before 78.12.0-8.33.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212458-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.