This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6139027282665491056==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="nVSl9fRYVi5DUGWxz99E1WZJq1ZNHEhu1"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--nVSl9fRYVi5DUGWxz99E1WZJq1ZNHEhu1
Content-Type: multipart/mixed; boundary="TFC6rU26T38w3Zw0O04I4ntlDiGczhOnv";
protected-headers="v1"
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-4064-1] Thunderbird vulnerabilities
--TFC6rU26T38w3Zw0O04I4ntlDiGczhOnv
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
==========================================================================
Ubuntu Security Notice USN-4064-1
July 17, 2019
thunderbird vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
A sandbox escape was discovered in Thunderbird. If a user were tricked in to
installing a malicious language pack, an attacker could exploit this to
gain additional privileges. (CVE-2019-9811)
Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
bypass same origin restrictions, conduct cross-site scripting (XSS)
attacks, spoof origin attributes, or execute arbitrary code.
(CVE-2019-11709, CVE-2019-11711, CVE-2019-11712, CVE-2019-11713,
CVE-2019-11715, CVE-2019-11717)
It was discovered that NSS incorrectly handled importing certain
curve25519 private keys. An attacker could exploit this issue to cause
Thunderbird to crash, resulting in a denial of service, or possibly
obtain sensitive information. (CVE-2019-11719)
It was discovered that NSS incorrectly handled certain p256-ECDH public
keys. An attacker could possibly exploit this issue to cause Thunderbird
to crash, resulting in a denial of service. (CVE-2019-11729)
It was discovered that Thunderbird treats all files in a directory as same
origin. If a user were tricked in to downloading a specially crafted HTML
file, an attacker could potentially exploit this to obtain sensitive
information from local files. (CVE-2019-11730)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
thunderbird 1:60.8.0+build1-0ubuntu0.19.04.1
Ubuntu 18.10:
thunderbird 1:60.8.0+build1-0ubuntu0.18.10.1
Ubuntu 18.04 LTS:
thunderbird 1:60.8.0+build1-0ubuntu0.18.04.1
Ubuntu 16.04 LTS:
thunderbird 1:60.8.0+build1-0ubuntu0.16.04.2
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
References:
https://usn.ubuntu.com/4064-1
CVE-2019-11709, CVE-2019-11711, CVE-2019-11712, CVE-2019-11713,
CVE-2019-11715, CVE-2019-11717, CVE-2019-11719, CVE-2019-11729,
CVE-2019-11730, CVE-2019-9811
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:60.8.0+build1-0ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:60.8.0+build1-0ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/thunderbird/1:60.8.0+build1-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:60.8.0+build1-0ubuntu0.16.04.2
--TFC6rU26T38w3Zw0O04I4ntlDiGczhOnv--
--nVSl9fRYVi5DUGWxz99E1WZJq1ZNHEhu1
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAl0vpRwACgkQYR+97NWU
bg8gwwf+K7bqhva7WlXY0OLE/MpyvwB3FqSn/42RfZ4mS3vmsk1bBfL4KJBp4HYW
vDXD82ixKANNHwLYsE6GbjrR1n9nsocKaJcyJ0REb01XLqVKeNx8Un6DvwIlktWO
2MB9B7wQ5rVBkbnEyf0dT4l3j35eiX1tVMlzYPnkZkYIFWMTjV33gmAJZ5LfU/Qc
hpS/8SsoyXJ1ySn9v4y7aR21a/L1vDEHMkrFvRnKGP/puHi150Uy540LEOTh1ETR
XvpMmaqwXvotr0AcfD5LAKFNCRPcQcbLA9ohuJSrpvYqJxQuJqCZlhauFZj1+zVu
6DlVyhyE7qcyzTPJ7Nkj6dg82H9/QA==
=jJ2J
-----END PGP SIGNATURE-----
--nVSl9fRYVi5DUGWxz99E1WZJq1ZNHEhu1--
--===============6139027282665491056==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============6139027282665491056==--
|