[USN-4995-2] Thunderbird vulnerabilities

Chris Coulson chris.coulson at canonical.com
Fri Jun 25 14:56:42 UTC 2021


==========================================================================
Ubuntu Security Notice USN-4995-2
June 25, 2021

thunderbird vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Thunderbird.

Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client

Details:

USN-4995-1 fixed vulnerabilities in Thunderbird. This update provides
the corresponding updates for Ubuntu 18.04 LTS.

Original advisory details:

 Multiple security issues were discovered in Thunderbird. If a user were
 tricked into opening a specially crafted website in a browsing context, an
 attacker could potentially exploit these to cause a denial of service,
 obtain sensitive information, spoof the UI, bypass security restrictions,
 or execute arbitrary code. (CVE-2021-23961, CVE-2021-23981,
 CVE-2021-23982, CVE-2021-23987, CVE-2021-23994, CVE-2021-23998,
 CVE-2021-23999, CVE-2021-29945, CVE-2021-29946, CVE-2021-29967)
  It was discovered that extensions could open popup windows with control
 of the window title in some circumstances. If a user were tricked into
 installing a specially crafted extension, an attacker could potentially
 exploit this to spoof a website and trick the user into providing
 credentials. (CVE-2021-23984)
  Multiple security issues were discovered in Thunderbird's OpenPGP
 integration. If a user were tricked into importing a specially crafted
 key in some circumstances, an attacker could potentially exploit this
 to cause a denial of service (inability to send encrypted email) or
 confuse the user. (CVE-2021-23991, CVE-2021-23992, CVE-2021-23993)
  A use-after-free was discovered when Responsive Design Mode was
 enabled. If a user were tricked into opening a specially crafted
 website with Responsive Design Mode enabled, an attacker could
 potentially exploit this to cause a denial of service, or execute
 arbitrary code. (CVE-2021-23995)
  It was discovered that Thunderbird mishandled ftp URLs with encoded
 newline characters. If a user were tricked into clicking on a specially
 crafted link, an attacker could potentially exploit this to send arbitrary
 FTP commands. (CVE-2021-24002)
  It was discovered that Thunderbird wrote signatures to disk and read them
 back during verification. A local attacker could potentially exploit this
 to replace the data with another signature file. (CVE-2021-29948)
  It was discovered that Thunderbird might load an alternative OTR
 library. If a user were tricked into copying a specially crafted
 library to one of Thunderbird's search paths, an attacker could
 potentially exploit this to execute arbitrary code. (CVE-2021-29949)
  It was discovered that secret keys imported into Thunderbird were
 stored unencrypted. A local attacker could potentially exploit this to
 obtain private keys. (CVE-2021-29956)
  It was discovered that Thunderbird did not indicate when an inline signed
 or encrypted message contained additional unprotected parts.
 (CVE-2021-29957)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  thunderbird                     1:78.11.0+build1-0ubuntu0.18.04.2

After a standard system update you need to restart Thunderbird to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-4995-2
  https://ubuntu.com/security/notices/USN-4995-1
  CVE-2021-23961, CVE-2021-23981, CVE-2021-23982, CVE-2021-23984,
  CVE-2021-23987, CVE-2021-23991, CVE-2021-23992, CVE-2021-23993,
  CVE-2021-23994, CVE-2021-23995, CVE-2021-23998, CVE-2021-23999,
  CVE-2021-24002, CVE-2021-29945, CVE-2021-29946, CVE-2021-29948,
  CVE-2021-29949, CVE-2021-29956, CVE-2021-29957, CVE-2021-29967

Package Information:

https://launchpad.net/ubuntu/+source/thunderbird/1:78.11.0+build1-0ubuntu0.18.04.2

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20210625/54722377/attachment.sig>


More information about the ubuntu-security-announce mailing list