Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Thunderbird
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Thunderbird
ID: USN-4995-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS, Ubuntu 20.10, Ubuntu 21.04
Datum: Di, 22. Juni 2021, 23:01
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29957
https://launchpad.net/ubuntu/+source/thunderbird/1:78.11.0+build1-0ubuntu0.20.04.2
https://launchpad.net/ubuntu/+source/thunderbird/1:78.11.0+build1-0ubuntu0.20.10.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
https://launchpad.net/ubuntu/+source/thunderbird/1:78.11.0+build1-0ubuntu0.21.04.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
Applikationen: Mozilla Thunderbird

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7496368506850429494==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="x1gmYpzW5K7NHcHOKc8HSmC5ZLLPZBYWC"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--x1gmYpzW5K7NHcHOKc8HSmC5ZLLPZBYWC
Content-Type: multipart/mixed;
boundary="ePgHDOS8LAPKAhPaAIJUJBFr2YRn2XKH3";
protected-headers="v1"
From: Chris Coulson <chris.coulson@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <8a259de8-4b0c-dbe1-7076-42ca1eb77253@canonical.com>
Subject: [USN-4995-1] Thunderbird vulnerabilities

--ePgHDOS8LAPKAhPaAIJUJBFr2YRn2XKH3
Content-Type: text/plain; charset=utf-8
Content-Language: en-U
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4995-1
June 22, 2021

thunderbird vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Thunderbird.

Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client

Details:

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, spoof the UI, bypass security restrictions,
or execute arbitrary code. (CVE-2021-23961, CVE-2021-23981,
CVE-2021-23982, CVE-2021-23987, CVE-2021-23994, CVE-2021-23998,
CVE-2021-23999, CVE-2021-29945, CVE-2021-29946, CVE-2021-29967)

It was discovered that extensions could open popup windows with control
of the window title in some circumstances. If a user were tricked into
installing a specially crafted extension, an attacker could potentially
exploit this to spoof a website and trick the user into providing
credentials. (CVE-2021-23984)

Multiple security issues were discovered in Thunderbird's OpenPGP
integration. If a user were tricked into importing a specially crafted
key in some circumstances, an attacker could potentially exploit this
to cause a denial of service (inability to send encrypted email) or
confuse the user. (CVE-2021-23991, CVE-2021-23992, CVE-2021-23993)

A use-after-free was discovered when Responsive Design Mode was
enabled. If a user were tricked into opening a specially crafted
website with Responsive Design Mode enabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2021-23995)

It was discovered that Thunderbird mishandled ftp URLs with encoded
newline characters. If a user were tricked into clicking on a specially
crafted link, an attacker could potentially exploit this to send arbitrary
FTP commands. (CVE-2021-24002)

It was discovered that Thunderbird wrote signatures to disk and read them
back during verification. A local attacker could potentially exploit this
to replace the data with another signature file. (CVE-2021-29948)

It was discovered that Thunderbird might load an alternative OTR
library. If a user were tricked into copying a specially crafted
library to one of Thunderbird's search paths, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2021-29949)

It was discovered that secret keys imported into Thunderbird were
stored unencrypted. A local attacker could potentially exploit this to
obtain private keys. (CVE-2021-29956)

It was discovered that Thunderbird did not indicate when an inline signed
or encrypted message contained additional unprotected parts.
(CVE-2021-29957)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
thunderbird 1:78.11.0+build1-0ubuntu0.21.04.2

Ubuntu 20.10:
thunderbird 1:78.11.0+build1-0ubuntu0.20.10.2

Ubuntu 20.04 LTS:
thunderbird 1:78.11.0+build1-0ubuntu0.20.04.2

After a standard system update you need to restart Thunderbird to make
all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-4995-1
CVE-2021-23961, CVE-2021-23981, CVE-2021-23982, CVE-2021-23984,
CVE-2021-23987, CVE-2021-23991, CVE-2021-23992, CVE-2021-23993,
CVE-2021-23994, CVE-2021-23995, CVE-2021-23998, CVE-2021-23999,
CVE-2021-24002, CVE-2021-29945, CVE-2021-29946, CVE-2021-29948,
CVE-2021-29949, CVE-2021-29956, CVE-2021-29957, CVE-2021-29967

Package Information:

https://launchpad.net/ubuntu/+source/thunderbird/1:78.11.0+build1-0ubuntu0.21.04.2

https://launchpad.net/ubuntu/+source/thunderbird/1:78.11.0+build1-0ubuntu0.20.10.2

https://launchpad.net/ubuntu/+source/thunderbird/1:78.11.0+build1-0ubuntu0.20.04.2


--ePgHDOS8LAPKAhPaAIJUJBFr2YRn2XKH3--

--x1gmYpzW5K7NHcHOKc8HSmC5ZLLPZBYWC
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAmDSGmQACgkQYR+97NWU
bg9h9QgAi0ZmSeYN4SCQiLZkKXGI0APTJoOJmccd556go1jkHkmZEl7pptSW/UIY
L9mlTBJ3ZkqGF8/FZFEqSHb2PcJimDL7Ldb9+0ecvxd6gJX6IBc0qZ+thKQE/N+0
+3PpMl9xMlxfcCSL4sGC7dYJBxttuEJOezE3x7QZeNcE0jY5P0L4eVCmCcZ8L8Cd
iJl23J9r4bnJnQ526uQTjGvg3bzXa8VzgJMJvzldpUGUft7U51v9khXy5l2SpIjW
CbicAFLSWzVG5x1YsoPT7nZnCBBz9cwS/jRdyfm0r26gP0bl/WNhjEzsYkgwSIPD
aBbCKA4Y+CgtCqWbzQ0Ym+5ol61nXg==
=0yUG
-----END PGP SIGNATURE-----

--x1gmYpzW5K7NHcHOKc8HSmC5ZLLPZBYWC--


--===============7496368506850429494==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============7496368506850429494==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung