First published: Tue Oct 03 2023(Updated: )
Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. (CVE-2023-4057, CVE-2023-4577, CVE-2023-4578, CVE-2023-4583, CVE-2023-4585, CVE-2023-5169, CVE-2023-5171, CVE-2023-5176) Andrew McCreight discovered that Thunderbird did not properly manage during the worker lifecycle. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2023-3600) Harveer Singh discovered that Thunderbird did not store push notifications in private browsing mode in encrypted form. An attacker could potentially exploit this issue to obtain sensitive information. (CVE-2023-4580) Clément Lecigne discovered that Thunderbird did not properly manage memory when handling VP8 media stream. An attacker-controlled VP8 media stream could lead to a heap buffer overflow in the content process, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-5217)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/thunderbird | <1:115.3.1+build1-0ubuntu0.23.04.1 | 1:115.3.1+build1-0ubuntu0.23.04.1 |
=23.04 | ||
All of | ||
ubuntu/thunderbird | <1:115.3.1+build1-0ubuntu0.22.04.2 | 1:115.3.1+build1-0ubuntu0.22.04.2 |
=22.04 | ||
All of | ||
ubuntu/thunderbird | <1:115.3.1+build1-0ubuntu0.20.04.1 | 1:115.3.1+build1-0ubuntu0.20.04.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this Thunderbird vulnerability is USN-6405-1.
The severity of USN-6405-1 is not specified in the provided information.
An attacker can potentially exploit USN-6405-1 by tricking a user into opening a specially crafted website to cause various security issues.
The software versions affected by USN-6405-1 are Thunderbird 1:115.3.1+build1-0ubuntu0.23.04.1, Thunderbird 1:115.3.1+build1-0ubuntu0.22.04.2, and Thunderbird 1:115.3.1+build1-0ubuntu0.20.04.1.
To fix USN-6405-1, you should update Thunderbird to the specified remedy versions: 1:115.3.1+build1-0ubuntu0.23.04.1, 1:115.3.1+build1-0ubuntu0.22.04.2, or 1:115.3.1+build1-0ubuntu0.20.04.1.