[USN-3278-1] Thunderbird vulnerabilities

Chris Coulson chris.coulson at canonical.com
Tue May 16 22:39:48 UTC 2017


==========================================================================
Ubuntu Security Notice USN-3278-1
May 16, 2017

thunderbird vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Thunderbird.

Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client

Details:

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted message, an attacker could
potentially exploit these to read uninitialized memory, cause a denial of
service via application crash, or execute arbitrary code. (CVE-2017-5429,
CVE-2017-5430, CVE-2017-5436, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445,
CVE-2017-5446, CVE-2017-5447, CVE-2017-5461, CVE-2017-5467)

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to spoof the addressbar
contents, conduct cross-site scripting (XSS) attacks, cause a denial of
service via application crash, or execute arbitrary code. (CVE-2017-5432,
CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5437, CVE-2017-5438,
CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5449,
CVE-2017-5451, CVE-2017-5454, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464,
CVE-2017-5465, CVE-2017-5466, CVE-2017-5469, CVE-2017-10195,
CVE-2017-10196, CVE-2017-10197)

A flaw was discovered in the DRBG number generation in NSS. If an
attacker were able to perform a man-in-the-middle attack, this flaw
could potentially be exploited to view sensitive information.
(CVE-2017-5462)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  thunderbird                     1:52.1.1+build1-0ubuntu0.17.04.1

Ubuntu 16.10:
  thunderbird                     1:52.1.1+build1-0ubuntu0.16.10.1

Ubuntu 16.04 LTS:
  thunderbird                     1:52.1.1+build1-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  thunderbird                     1:52.1.1+build1-0ubuntu0.14.04.1

After a standard system update you need to restart Thunderbird to make
all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-3278-1
  CVE-2017-10195, CVE-2017-10196, CVE-2017-10197, CVE-2017-5429,
  CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434,
  CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438,
  CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442,
  CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446,
  CVE-2017-5447, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454,
  CVE-2017-5459, CVE-2017-5460, CVE-2017-5461, CVE-2017-5462,
  CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467,
  CVE-2017-5469

Package Information:
  https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.17.04.1
  https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.16.10.1
  https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.16.04.1
  https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.14.04.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170516/e9796e5f/attachment.sig>


More information about the ubuntu-security-announce mailing list