USN-4335-1

Source
https://ubuntu.com/security/notices/USN-4335-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4335-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4335-1
Upstream
  • UBUNTU-CVE-2019-11758
Related
Published
2020-04-21T20:14:22.595744Z
Modified
2025-09-08T16:36:44Z
Summary
thunderbird vulnerabilities
Details

Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting (XSS) attacks, or execute arbitrary code. (CVE-2019-11757, CVE-2019-11758, CVE-2019-11759, CVE-2019-11760, CVE-2019-11761, CVE-2019-11762, CVE-2019-11763, CVE-2019-11764, CVE-2019-17005, CVE-2019-17008, CVE-2019-17010, CVE-2019-17011, CVE-2019-17012, CVE-2019-17016, CVE-2019-17017, CVE-2019-17022, CVE-2019-17024, CVE-2019-17026, CVE-2019-20503, CVE-2020-6798, CVE-2020-6800, CVE-2020-6805, CVE-2020-6806, CVE-2020-6807, CVE-2020-6812, CVE-2020-6814, CVE-2020-6819, CVE-2020-6820, CVE-2020-6821, CVE-2020-6825)

It was discovered that NSS incorrectly handled certain memory operations. A remote attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. (CVE-2019-11745)

It was discovered that a specially crafted S/MIME message with an inner encryption layer could be displayed as having a valid signature in some circumstances, even if the signer had no access to the encrypted message. An attacker could potentially exploit this to spoof the message author. (CVE-2019-11755)

A heap overflow was discovered in the expat library in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. (CVE-2019-15903)

It was discovered that Message ID calculation was based on uninitialized data. An attacker could potentially exploit this to obtain sensitive information. (CVE-2020-6792)

Mutiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, or execute arbitrary code. (CVE-2020-6793, CVE-2020-6795, CVE-2020-6822)

It was discovered that if a user saved passwords before Thunderbird 60 and then later set a primary password, an unencrypted copy of these passwords would still be accessible. A local user could exploit this to obtain sensitive information. (CVE-2020-6794)

It was discovered that the Devtools’ ‘Copy as cURL’ feature did not fully escape website-controlled data. If a user were tricked in to using the ‘Copy as cURL’ feature to copy and paste a command with specially crafted data in to a terminal, an attacker could potentially exploit this to execute arbitrary commands via command injection. (CVE-2020-6811)

References

Affected packages

Ubuntu:16.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:68.7.0+build1-0ubuntu0.16.04.2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:68.7.0+build1-0ubuntu0.16.04.2

Affected versions

1:38.*

1:38.3.0+build1-0ubuntu2
1:38.5.1+build2-0ubuntu1
1:38.6.0+build1-0ubuntu1
1:38.7.2+build1-0ubuntu0.16.04.1
1:38.8.0+build1-0ubuntu0.16.04.1

1:45.*

1:45.2.0+build1-0ubuntu0.16.04.1
1:45.3.0+build1-0ubuntu0.16.04.2
1:45.4.0+build1-0ubuntu0.16.04.1
1:45.5.1+build1-0ubuntu0.16.04.1
1:45.7.0+build1-0ubuntu0.16.04.1
1:45.8.0+build1-0ubuntu0.16.04.1

1:52.*

1:52.1.1+build1-0ubuntu0.16.04.1
1:52.2.1+build1-0ubuntu0.16.04.1
1:52.3.0+build1-0ubuntu0.16.04.1
1:52.4.0+build1-0ubuntu0.16.04.2
1:52.5.0+build1-0ubuntu0.16.04.1
1:52.6.0+build1-0ubuntu0.16.04.1
1:52.7.0+build1-0ubuntu0.16.04.1
1:52.8.0+build1-0ubuntu0.16.04.1
1:52.9.1+build3-0ubuntu0.16.04.1

1:60.*

1:60.2.1+build1-0ubuntu0.16.04.4
1:60.4.0+build2-0ubuntu0.16.04.1
1:60.5.1+build2-0ubuntu0.16.04.1
1:60.6.1+build2-0ubuntu0.16.04.1
1:60.7.0+build1-0ubuntu0.16.04.1
1:60.7.1+build1-0ubuntu0.16.04.1
1:60.7.2+build2-0ubuntu0.16.04.1
1:60.8.0+build1-0ubuntu0.16.04.2
1:60.9.0+build1-0ubuntu0.16.04.2
1:60.9.1+build1-0ubuntu0.16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:68.7.0+build1-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:68.7.0+build1-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:68.7.0+build1-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:68.7.0+build1-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:68.7.0+build1-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:68.7.0+build1-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:68.7.0+build1-0ubuntu0.16.04.2"
        }
    ]
}