Arch Linux alert ASA-201906-10 (thunderbird)
From: | Remi Gacogne <rgacogne@archlinux.org> | |
To: | arch-security@archlinux.org | |
Subject: | [ASA-201906-10] thunderbird: multiple issues | |
Date: | Fri, 14 Jun 2019 17:10:09 +0200 | |
Message-ID: | <151f3965-f135-fa13-78ae-1780b2d260c0@archlinux.org> |
Arch Linux Security Advisory ASA-201906-10 ========================================== Severity: High Date : 2019-06-14 CVE-ID : CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706 Package : thunderbird Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-980 Summary ======= The package thunderbird before version 60.7.1-1 is vulnerable to multiple issues including arbitrary code execution and denial of service. Resolution ========== Upgrade to 60.7.1-1. # pacman -Syu "thunderbird>=60.7.1-1" The problems have been fixed upstream in version 60.7.1. Workaround ========== None. Description =========== - CVE-2019-11703 (arbitrary code execution) A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. - CVE-2019-11704 (arbitrary code execution) A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash. - CVE-2019-11705 (arbitrary code execution) A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash. - CVE-2019-11706 (denial of service) A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash. Impact ====== A remote attacker can crash thunderbird or execute arbitrary code on the affected host via a crafted email message. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa201... https://www.mozilla.org/en-US/security/advisories/mfsa201... https://bugzilla.mozilla.org/show_bug.cgi?id=1553820 https://www.mozilla.org/en-US/security/advisories/mfsa201... https://bugzilla.mozilla.org/show_bug.cgi?id=1553814 https://www.mozilla.org/en-US/security/advisories/mfsa201... https://bugzilla.mozilla.org/show_bug.cgi?id=1553808 https://www.mozilla.org/en-US/security/advisories/mfsa201... https://security.archlinux.org/CVE-2019-11703 https://security.archlinux.org/CVE-2019-11704 https://security.archlinux.org/CVE-2019-11705 https://security.archlinux.org/CVE-2019-11706