USN-2330-1

Source
https://ubuntu.com/security/notices/USN-2330-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2330-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2330-1
Upstream
Related
Published
2014-09-11T22:31:49Z
Modified
2026-02-10T04:40:49Z
Summary
thunderbird vulnerabilities
Details

Jan de Mooij, Christian Holler, Karl Tomlinson, Randell Jesup, Gary Kwong, Jesse Ruderman and JW Wang discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1553, CVE-2014-1562)

Abhishek Arya discovered a use-after-free during DOM interactions with SVG. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1563)

Michal Zalewski discovered that memory is not initialized properly during GIF rendering in some circumstances. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to steal confidential information. (CVE-2014-1564)

Holger Fuhrmannek discovered an out-of-bounds read in Web Audio. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to cause a denial of service via application crash or steal confidential information. (CVE-2014-1565)

A use-after-free was discovered during text layout in some circumstances. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1567)

References

Affected packages

Ubuntu:14.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:31.1.1+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:31.1.1+build1-0ubuntu0.14.04.1

Affected versions

1:24.*
1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1
1:31.*
1:31.0+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-globalmenu",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-testsuite",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:31.1.1+build1-0ubuntu0.14.04.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2330-1.json"
cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2014-1553"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2014-1562"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2014-1563"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2014-1564"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2014-1565"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2014-1567"
        }
    ]
}