First published: Thu Sep 22 2016(Updated: )
Christian Holler, Carsten Book, Gary Kwong, Jesse Ruderman, Andrew McCreight, and Phil Ringnalda discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-2836)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/thunderbird | <1:45.3.0+build1-0ubuntu0.16.04.2 | 1:45.3.0+build1-0ubuntu0.16.04.2 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/thunderbird | <1:45.3.0+build1-0ubuntu0.14.04.4 | 1:45.3.0+build1-0ubuntu0.14.04.4 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/thunderbird | <1:45.3.0+build1-0ubuntu0.12.04.1 | 1:45.3.0+build1-0ubuntu0.12.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3073-1: Thunderbird vulnerabilities
Christian Holler, Carsten Book, Gary Kwong, Jesse Ruderman, Andrew McCreight, and Phil Ringnalda
An attacker could potentially cause a denial of service via a specially crafted message.
Versions 1:45.3.0+build1-0ubuntu0.16.04.2, 1:45.3.0+build1-0ubuntu0.14.04.4, and 1:45.3.0+build1-0ubuntu0.12.04.1 of Thunderbird on Ubuntu are affected.
More information about the vulnerability can be found at the following links: [CVE-2016-2836](https://ubuntu.com/security/CVE-2016-2836), [USN-3044-1](https://ubuntu.com/security/notices/USN-3044-1), [Launchpad](https://launchpad.net/ubuntu/+source/thunderbird/1:45.3.0+build1-0ubuntu0.16.04.2)