CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS
Percentile
97.7%
Severity: Critical
Date : 2019-05-23
CVE-ID : CVE-2019-5798 CVE-2019-7317 CVE-2019-9800 CVE-2019-9816
CVE-2019-9817 CVE-2019-9819 CVE-2019-11691 CVE-2019-11692
CVE-2019-11693 CVE-2019-11698 CVE-2019-18511
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-965
The package thunderbird before version 60.7.0-1 is vulnerable to
multiple issues including arbitrary code execution, access restriction
bypass, same-origin policy bypass, information disclosure and denial of
service.
Upgrade to 60.7.0-1.
The problems have been fixed upstream in version 60.7.0.
None.
An out-of-bounds read has been found in the Skia component of the
chromium browser before 73.0.3683.75 and Thunderbird before 60.7.0.
png_image_free in png.c in libpng 1.6.36 has a use-after-free because
png_image_free_function is called under png_safe_execute.
Several memory safety bugs have been found in Firefox before 67.0 and
Thunderbird before 60.7.0. Some of these bugs showed evidence of memory
corruption and Mozilla presumes that with enough effort some of these
could be exploited to run arbitrary code.
A possible vulnerability exists in Firefox before 67.0 and Thunderbird
before 60.7.0, where type confusion can occur when manipulating
JavaScript objects in object groups, allowing for the bypassing of
security checks within these groups. Note that this vulnerability has
only been demonstrated with UnboxedObjects, which are disabled by
default on all supported releases.
In Firefox before 67.0 and Thunderbird before 60.7.0, images from a
different domain can be read using a canvas object in some
circumstances. This could be used to steal image data from a different
site in violation of same-origin policy.
A vulnerability where a JavaScript compartment mismatch can occur in
Firefox before 67.0 and Thunderbird before 60.7.0, while working with
the fetch API, resulting in a potentially exploitable crash.
A use-after-free vulnerability can occur in Firefox before 67.0 and
Thunderbird before 60.7.0, when working with XMLHttpRequest (XHR) in an
event loop, causing the XHR main thread to be called after it has been
freed. This results in a potentially exploitable crash.
A use-after-free vulnerability can occur in Firefox before 67.0 and
Thunderbird before 60.7.0, when listeners are removed from the event
listener manager while still in use, resulting in a potentially
exploitable crash.
The bufferdata function in WebGL in Firefox before 67.0 and Thunderbird
before 60.7.0 is vulnerable to a buffer overflow with specific graphics
drivers on Linux. This could result in malicious content freezing a tab
or triggering a potentially exploitable crash.
If a crafted hyperlink is dragged and dropped to the bookmark bar or
sidebar in Firefox before 67.0 or Thunderbird before 60.7.0, and the
resulting bookmark is subsequently dragged and dropped into the web
content area, an arbitrary query of a user’s browser history can be run
and transmitted to the content page via drop event data. This allows
for the theft of browser history by a malicious site.
An issue has been found in Thunderbird before 60.7.0, where cross-
origin images can be read from a canvas element in violation of the
same-origin policy using the transferFromImageBitmap method.
A remote attacker can crash Thunderbird, access sensitive information,
bypass security measures or execute arbitrary code on the affected
host.
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/
https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-5798
https://bugs.chromium.org/p/chromium/issues/detail?id=883596
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
https://github.com/glennrp/libpng/issues/275
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9800
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9816
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9816
https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9817
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9817
https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9819
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9819
https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11691
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11691
https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11692
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11692
https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11693
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11693
https://bugzilla.mozilla.org/show_bug.cgi?id=1532525
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11698
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11698
https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2018-18511
https://bugzilla.mozilla.org/show_bug.cgi?id=1526218
https://security.archlinux.org/CVE-2019-5798
https://security.archlinux.org/CVE-2019-7317
https://security.archlinux.org/CVE-2019-9800
https://security.archlinux.org/CVE-2019-9816
https://security.archlinux.org/CVE-2019-9817
https://security.archlinux.org/CVE-2019-9819
https://security.archlinux.org/CVE-2019-11691
https://security.archlinux.org/CVE-2019-11692
https://security.archlinux.org/CVE-2019-11693
https://security.archlinux.org/CVE-2019-11698
https://security.archlinux.org/CVE-2019-18511
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | thunderbird | < 60.7.0-1 | UNKNOWN |
bugs.chromium.org/p/chromium/issues/detail?id=883596
bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
bugzilla.mozilla.org/show_bug.cgi?id=1526218
bugzilla.mozilla.org/show_bug.cgi?id=1532525
bugzilla.mozilla.org/show_bug.cgi?id=1532553
bugzilla.mozilla.org/show_bug.cgi?id=1536768
bugzilla.mozilla.org/show_bug.cgi?id=1540221
bugzilla.mozilla.org/show_bug.cgi?id=1542465
bugzilla.mozilla.org/show_bug.cgi?id=1543191
bugzilla.mozilla.org/show_bug.cgi?id=1544670
chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
github.com/glennrp/libpng/issues/275
security.archlinux.org/AVG-965
security.archlinux.org/CVE-2019-11691
security.archlinux.org/CVE-2019-11692
security.archlinux.org/CVE-2019-11693
security.archlinux.org/CVE-2019-11698
security.archlinux.org/CVE-2019-18511
security.archlinux.org/CVE-2019-5798
security.archlinux.org/CVE-2019-7317
security.archlinux.org/CVE-2019-9800
security.archlinux.org/CVE-2019-9816
security.archlinux.org/CVE-2019-9817
security.archlinux.org/CVE-2019-9819
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11691
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11692
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11693
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-11698
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9800
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9816
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9817
www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-9819
www.mozilla.org/en-US/security/advisories/mfsa2019-15/
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2018-18511
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11691
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11692
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11693
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-11698
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-5798
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9816
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9817
www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-9819
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS
Percentile
97.7%