CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.2%
Issue Overview:
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. (CVE-2018-18506)
Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791)
Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793)
Use-after-free when removing in-use DOM elements (CVE-2019-9790)
Ionmonkey type confusion with proto mutations (CVE-2019-9813)
IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810)
Type-confusion in IonMonkey JIT compiler (CVE-2019-9795)
Use-after-free with SMIL animation controller (CVE-2019-9796)
Memory safety bugs fixed in Mozilla libraries (CVE-2019-9788)
IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792)
Affected Packages:
thunderbird
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update thunderbird to update your system.
New Packages:
src:
thunderbird-60.6.1-1.amzn2.0.1.src
x86_64:
thunderbird-60.6.1-1.amzn2.0.1.x86_64
thunderbird-debuginfo-60.6.1-1.amzn2.0.1.x86_64
Red Hat: CVE-2018-18506, CVE-2019-9788, CVE-2019-9790, CVE-2019-9791, CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813
Mitre: CVE-2018-18506, CVE-2019-9788, CVE-2019-9790, CVE-2019-9791, CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | x86_64 | thunderbird | < 60.6.1-1.amzn2.0.1 | thunderbird-60.6.1-1.amzn2.0.1.x86_64.rpm |
Amazon Linux | 2 | x86_64 | thunderbird-debuginfo | < 60.6.1-1.amzn2.0.1 | thunderbird-debuginfo-60.6.1-1.amzn2.0.1.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.2%