First published: Wed Oct 11 2017(Updated: )
Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing-like context, an attacker could potentially exploit these to read uninitialized memory, bypass phishing and malware protection, conduct cross-site scripting (XSS) attacks, cause a denial of service via application crash, or execute arbitrary code. (CVE-2017-7793, CVE-2017-7810, CVE-2017-7814, CVE-2017-7818, CVE-2017-7819, CVE-2017-7823, CVE-2017-7824) Martin Thomson discovered that NSS incorrectly generated handshake hashes. A remote attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2017-7805)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/thunderbird | <1:52.4.0+build1-0ubuntu0.17.04.2 | 1:52.4.0+build1-0ubuntu0.17.04.2 |
=17.04 | ||
All of | ||
ubuntu/thunderbird | <1:52.4.0+build1-0ubuntu0.16.04.2 | 1:52.4.0+build1-0ubuntu0.16.04.2 |
=16.04 | ||
All of | ||
ubuntu/thunderbird | <1:52.4.0+build1-0ubuntu0.14.04.2 | 1:52.4.0+build1-0ubuntu0.14.04.2 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID is USN-3436-1.
The title of the vulnerability is Thunderbird vulnerabilities.
The Thunderbird software version 1:52.4.0+build1-0ubuntu0.17.04.2, 1:52.4.0+build1-0ubuntu0.16.04.2, and 1:52.4.0+build1-0ubuntu0.14.04.2 on Ubuntu 17.04, 16.04, and 14.04 respectively are affected by this vulnerability.
The severity of this vulnerability is not provided.
To fix this vulnerability, you should update Thunderbird to the latest version available for your Ubuntu version.