[USN-3278-1] Thunderbird vulnerabilities
Chris Coulson
chris.coulson at canonical.com
Tue May 16 22:39:48 UTC 2017
==========================================================================
Ubuntu Security Notice USN-3278-1
May 16, 2017
thunderbird vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted message, an attacker could
potentially exploit these to read uninitialized memory, cause a denial of
service via application crash, or execute arbitrary code. (CVE-2017-5429,
CVE-2017-5430, CVE-2017-5436, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445,
CVE-2017-5446, CVE-2017-5447, CVE-2017-5461, CVE-2017-5467)
Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to spoof the addressbar
contents, conduct cross-site scripting (XSS) attacks, cause a denial of
service via application crash, or execute arbitrary code. (CVE-2017-5432,
CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5437, CVE-2017-5438,
CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5449,
CVE-2017-5451, CVE-2017-5454, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464,
CVE-2017-5465, CVE-2017-5466, CVE-2017-5469, CVE-2017-10195,
CVE-2017-10196, CVE-2017-10197)
A flaw was discovered in the DRBG number generation in NSS. If an
attacker were able to perform a man-in-the-middle attack, this flaw
could potentially be exploited to view sensitive information.
(CVE-2017-5462)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
thunderbird 1:52.1.1+build1-0ubuntu0.17.04.1
Ubuntu 16.10:
thunderbird 1:52.1.1+build1-0ubuntu0.16.10.1
Ubuntu 16.04 LTS:
thunderbird 1:52.1.1+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
thunderbird 1:52.1.1+build1-0ubuntu0.14.04.1
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3278-1
CVE-2017-10195, CVE-2017-10196, CVE-2017-10197, CVE-2017-5429,
CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434,
CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438,
CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442,
CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446,
CVE-2017-5447, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454,
CVE-2017-5459, CVE-2017-5460, CVE-2017-5461, CVE-2017-5462,
CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467,
CVE-2017-5469
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.16.10.1
https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:52.1.1+build1-0ubuntu0.14.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170516/e9796e5f/attachment.sig>
More information about the ubuntu-security-announce
mailing list