First published: Tue Oct 08 2019(Updated: )
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739) Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to obtain sensitive information, conduct cross-site scripting (XSS) attack, scause a denial of service, or execute arbitrary code. (CVE-2019-11740, CVE-2019-11742, CVE-2019-11743, CVE-2019-11744, CVE-2019-11746, CVE-2019-11752)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/thunderbird | <1:60.9.0+build1-0ubuntu0.19.04.1 | 1:60.9.0+build1-0ubuntu0.19.04.1 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/thunderbird | <1:60.9.0+build1-0ubuntu0.18.04.1 | 1:60.9.0+build1-0ubuntu0.18.04.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/thunderbird | <1:60.9.0+build1-0ubuntu0.16.04.2 | 1:60.9.0+build1-0ubuntu0.16.04.2 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-4150-1 is considered high due to the potential for plaintext leakage from encrypted S/MIME parts.
To fix USN-4150-1, you should update Thunderbird to the latest version appropriate for your Ubuntu release.
USN-4150-1 affects Thunderbird versions prior to 1:60.9.0+build1-0ubuntu0.19.04.1, 1:60.9.0+build1-0ubuntu0.18.04.1, and 1:60.9.0+build1-0ubuntu0.16.04.2.
If you are affected by USN-4150-1 and respond to a specially crafted message, plaintext content could be exposed to an attacker.
Yes, users are advised to avoid replying to or forwarding suspicious messages until their Thunderbird application is updated.