USN-2506-1

Source
https://ubuntu.com/security/notices/USN-2506-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2506-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2506-1
Upstream
Related
Published
2015-03-03T10:02:08Z
Modified
2026-04-22T09:08:40.424513Z
Summary
thunderbird vulnerabilities
Details

Armin Razmdjou discovered that contents of locally readable files could be made available via manipulation of form autocomplete in some circumstances. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-0822)

Abhishek Arya discovered an out-of-bounds read and write when rendering SVG content in some circumstances. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-0827)

Paul Bandha discovered a use-after-free in IndexedDB. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-0831)

Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij, Liz Henry, Byron Campen, Tom Schuster, and Ryan VanderMeulen discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-0836)

References

Affected packages

Ubuntu:14.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:31.5.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:31.5.0+build1-0ubuntu0.14.04.1

Affected versions

1:24.*
1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1
1:31.*
1:31.0+build1-0ubuntu0.14.04.1
1:31.1.1+build1-0ubuntu0.14.04.1
1:31.1.2+build1-0ubuntu0.14.04.1
1:31.2.0+build2-0ubuntu0.14.04.1
1:31.3.0+build1-0ubuntu0.14.04.1
1:31.4.0+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-globalmenu",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-testsuite",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2015-0822",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2015-0827",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2015-0831",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2015-0836",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:14.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2506-1.json"