USN-4995-1

Source
https://ubuntu.com/security/notices/USN-4995-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4995-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4995-1
Upstream
Related
Published
2021-06-22T16:43:02.210357Z
Modified
2025-09-08T16:37:04Z
Summary
thunderbird vulnerabilities
Details

Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, spoof the UI, bypass security restrictions, or execute arbitrary code. (CVE-2021-23961, CVE-2021-23981, CVE-2021-23982, CVE-2021-23987, CVE-2021-23994, CVE-2021-23998, CVE-2021-23999, CVE-2021-29945, CVE-2021-29946, CVE-2021-29967)

It was discovered that extensions could open popup windows with control of the window title in some circumstances. If a user were tricked into installing a specially crafted extension, an attacker could potentially exploit this to spoof a website and trick the user into providing credentials. (CVE-2021-23984)

Multiple security issues were discovered in Thunderbird's OpenPGP integration. If a user were tricked into importing a specially crafted key in some circumstances, an attacker could potentially exploit this to cause a denial of service (inability to send encrypted email) or confuse the user. (CVE-2021-23991, CVE-2021-23992, CVE-2021-23993)

A use-after-free was discovered when Responsive Design Mode was enabled. If a user were tricked into opening a specially crafted website with Responsive Design Mode enabled, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. (CVE-2021-23995)

It was discovered that Thunderbird mishandled ftp URLs with encoded newline characters. If a user were tricked into clicking on a specially crafted link, an attacker could potentially exploit this to send arbitrary FTP commands. (CVE-2021-24002)

It was discovered that Thunderbird wrote signatures to disk and read them back during verification. A local attacker could potentially exploit this to replace the data with another signature file. (CVE-2021-29948)

It was discovered that Thunderbird might load an alternative OTR library. If a user were tricked into copying a specially crafted library to one of Thunderbird's search paths, an attacker could potentially exploit this to execute arbitrary code. (CVE-2021-29949)

It was discovered that secret keys imported into Thunderbird were stored unencrypted. A local attacker could potentially exploit this to obtain private keys. (CVE-2021-29956)

It was discovered that Thunderbird did not indicate when an inline signed or encrypted message contained additional unprotected parts. (CVE-2021-29957)

References

Affected packages

Ubuntu:20.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:78.11.0+build1-0ubuntu0.20.04.2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:78.11.0+build1-0ubuntu0.20.04.2

Affected versions

1:68.*

1:68.1.2+build1-0ubuntu1
1:68.1.2+build1-0ubuntu2
1:68.2.1+build1-0ubuntu1
1:68.2.2+build1-0ubuntu1
1:68.3.0+build2-0ubuntu1
1:68.3.1+build1-0ubuntu2
1:68.4.1+build1-0ubuntu1
1:68.4.2+build2-0ubuntu1
1:68.5.0+build1-0ubuntu1
1:68.6.0+build2-0ubuntu1
1:68.7.0+build1-0ubuntu1
1:68.7.0+build1-0ubuntu2
1:68.8.0+build2-0ubuntu0.20.04.2
1:68.10.0+build1-0ubuntu0.20.04.1

1:78.*

1:78.7.1+build1-0ubuntu0.20.04.1
1:78.8.1+build1-0ubuntu0.20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:78.11.0+build1-0ubuntu0.20.04.2"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:78.11.0+build1-0ubuntu0.20.04.2"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:78.11.0+build1-0ubuntu0.20.04.2"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:78.11.0+build1-0ubuntu0.20.04.2"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:78.11.0+build1-0ubuntu0.20.04.2"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:78.11.0+build1-0ubuntu0.20.04.2"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:78.11.0+build1-0ubuntu0.20.04.2"
        }
    ]
}