The remote host is affected by the vulnerability described in GLSA-202305-36 (Mozilla Thunderbird: Multiple Vulnerabilities)
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer’s ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. (CVE-2023-28427)
Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. (CVE-2023-0767)
Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. (CVE-2023-1945)
A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.
(CVE-2023-1999)
Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. (CVE-2023-25729)
A background script invoking <code>requestFullscreen</code> and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks.
(CVE-2023-25730)
When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write.
(CVE-2023-25732)
After downloading a Windows <code>.url</code> shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource. This bug only affects Thunderbird on Windows. Other operating systems are unaffected. (CVE-2023-25734)
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy.
(CVE-2023-25735)
An invalid downcast from <code>nsTextNode</code> to <code>SVGElement</code> could have lead to undefined behavior. (CVE-2023-25737)
Members of the <code>DEVMODEW</code> struct set by the printer device driver weren’t being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables. This bug only affects Thunderbird on Windows. Other operating systems are unaffected. (CVE-2023-25738)
Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in <code>ScriptLoadContext</code>. (CVE-2023-25739)
After downloading a Windows <code>.scf</code> script from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource. This bug only affects Firefox for Windows. Other operating systems are unaffected. (CVE-2023-25740)
When dragging and dropping an image cross-origin, the image’s size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. (CVE-2023-25741)
When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. (CVE-2023-25742)
Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
Mozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2023-25744)
Mozilla developers Timothy Nikkel, Gabriele Svelto, Jeff Muizelaar and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
(CVE-2023-25745)
Mozilla developers Philipp and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.7.
Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2023-25746)
Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751)
Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752)
Mozilla: Invalid downcast in Worklets (CVE-2023-28162)
When downloading files through the Save As dialog on Windows with suggested filenames containing environment variable names, Windows would have resolved those in the context of the current user. This bug only affects Firefox on Windows. Other versions of Firefox are unaffected. (CVE-2023-28163)
Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164)
Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176)
A website could have obscured the fullscreen notification by using a combination of <code>window.open</code>, fullscreen requests, <code>window.name</code> assignments, and <code>setInterval</code> calls. This could have led to user confusion and possible spoofing attacks.
(CVE-2023-29533)
Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash. (CVE-2023-29535)
An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker- controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash.
(CVE-2023-29536)
When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. (CVE-2023-29539)
Thunderbird did not properly handle downloads of files ending in <code>.desktop</code>, which can be interpreted to run attacker-controlled commands. This bug only affects Thunderbird for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions. (CVE-2023-29541)
A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result.
(CVE-2023-29548)
Mozilla developers Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2023-29550)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
#
# (C) Tenable, Inc.
#
# @NOAGENT@
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 202305-36.
#
# The advisory text is Copyright (C) 2001-2021 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#
include('compat.inc');
if (description)
{
script_id(176468);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/29");
script_cve_id(
"CVE-2023-0616",
"CVE-2023-0767",
"CVE-2023-1945",
"CVE-2023-1999",
"CVE-2023-25728",
"CVE-2023-25729",
"CVE-2023-25730",
"CVE-2023-25732",
"CVE-2023-25734",
"CVE-2023-25735",
"CVE-2023-25737",
"CVE-2023-25738",
"CVE-2023-25739",
"CVE-2023-25740",
"CVE-2023-25741",
"CVE-2023-25742",
"CVE-2023-25743",
"CVE-2023-25744",
"CVE-2023-25745",
"CVE-2023-25746",
"CVE-2023-25751",
"CVE-2023-25752",
"CVE-2023-28162",
"CVE-2023-28163",
"CVE-2023-28164",
"CVE-2023-28176",
"CVE-2023-28427",
"CVE-2023-29533",
"CVE-2023-29535",
"CVE-2023-29536",
"CVE-2023-29539",
"CVE-2023-29541",
"CVE-2023-29548",
"CVE-2023-29550"
);
script_name(english:"GLSA-202305-36 : Mozilla Thunderbird: Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"");
script_set_attribute(attribute:"description", value:
"The remote host is affected by the vulnerability described in GLSA-202305-36 (Mozilla Thunderbird: Multiple
Vulnerabilities)
- matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0
events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from
functioning properly, potentially impacting the consumer's ability to process data safely. Note that the
matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to
the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The
issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known
workarounds for this vulnerability. (CVE-2023-28427)
- Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
- An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory
writes via PKCS 12 Safe Bag attributes being mishandled. (CVE-2023-0767)
- Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially
exploitable crash. (CVE-2023-1945)
- A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.
(CVE-2023-1999)
- Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
- Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code>
resulting in extensions being able to open them without user interaction via
<code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or
interacting with software already installed on the system. (CVE-2023-25729)
- A background script invoking <code>requestFullscreen</code> and then blocking the main thread could force
the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks.
(CVE-2023-25730)
- When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being
encoded was not correctly calculated potentially leading to an out of bounds memory write.
(CVE-2023-25732)
- After downloading a Windows <code>.url</code> shortcut from the local filesystem, an attacker could supply
a remote path that would lead to unexpected network requests from the operating system. This also had the
potential to leak NTLM credentials to the resource. This bug only affects Thunderbird on Windows. Other
operating systems are unaffected. (CVE-2023-25734)
- Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to
be stored in the main compartment resulting in a use-after-free after unwrapping the proxy.
(CVE-2023-25735)
- An invalid downcast from <code>nsTextNode</code> to <code>SVGElement</code> could have lead to undefined
behavior. (CVE-2023-25737)
- Members of the <code>DEVMODEW</code> struct set by the printer device driver weren't being validated and
could have resulted in invalid values which in turn would cause the browser to attempt out of bounds
access to related variables. This bug only affects Thunderbird on Windows. Other operating systems are
unaffected. (CVE-2023-25738)
- Module load requests that failed were not being checked as to whether or not they were cancelled causing a
use-after-free in <code>ScriptLoadContext</code>. (CVE-2023-25739)
- After downloading a Windows <code>.scf</code> script from the local filesystem, an attacker could supply a
remote path that would lead to unexpected network requests from the operating system. This also had the
potential to leak NTLM credentials to the resource. This bug only affects Firefox for Windows. Other
operating systems are unaffected. (CVE-2023-25740)
- When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This
behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the
behavior was disabled until further review. (CVE-2023-25741)
- When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab
to crash. (CVE-2023-25742)
- Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
- Mozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in
Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume
that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2023-25744)
- Mozilla developers Timothy Nikkel, Gabriele Svelto, Jeff Muizelaar and the Mozilla Fuzzing Team reported
memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption and we
presume that with enough effort some of these could have been exploited to run arbitrary code.
(CVE-2023-25745)
- Mozilla developers Philipp and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.7.
Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of
these could have been exploited to run arbitrary code. (CVE-2023-25746)
- Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751)
- Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752)
- Mozilla: Invalid downcast in Worklets (CVE-2023-28162)
- When downloading files through the Save As dialog on Windows with suggested filenames containing
environment variable names, Windows would have resolved those in the context of the current user. This
bug only affects Firefox on Windows. Other versions of Firefox are unaffected. (CVE-2023-28163)
- Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation
(CVE-2023-28164)
- Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176)
- A website could have obscured the fullscreen notification by using a combination of
<code>window.open</code>, fullscreen requests, <code>window.name</code> assignments, and
<code>setInterval</code> calls. This could have led to user confusion and possible spoofing attacks.
(CVE-2023-29533)
- Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly
traced. This resulted in memory corruption and a potentially exploitable crash. (CVE-2023-29535)
- An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-
controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash.
(CVE-2023-29536)
- When handling the filename directive in the Content-Disposition header, the filename would be truncated if
the filename contained a NULL character. This could have led to reflected file download attacks
potentially tricking users to install malware. (CVE-2023-29539)
- Thunderbird did not properly handle downloads of files ending in <code>.desktop</code>, which can be
interpreted to run attacker-controlled commands. This bug only affects Thunderbird for Linux on certain
Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected
Linux Distributions. (CVE-2023-29541)
- A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result.
(CVE-2023-29548)
- Mozilla developers Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team
reported memory safety bugs present in Thunderbird 102.9. Some of these bugs showed evidence of memory
corruption and we presume that with enough effort some of these could have been exploited to run arbitrary
code. (CVE-2023-29550)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://security.gentoo.org/glsa/202305-36");
script_set_attribute(attribute:"see_also", value:"https://bugs.gentoo.org/show_bug.cgi?id=895960");
script_set_attribute(attribute:"see_also", value:"https://bugs.gentoo.org/show_bug.cgi?id=903619");
script_set_attribute(attribute:"see_also", value:"https://bugs.gentoo.org/show_bug.cgi?id=905890");
script_set_attribute(attribute:"solution", value:
"All Mozilla Thunderbird users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose >=mail-client/thunderbird-102.10.0
All Mozilla Thunderbird binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose >=mail-client/thunderbird-bin-102.10.0");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-29550");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/02/14");
script_set_attribute(attribute:"patch_publication_date", value:"2023/05/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/05/30");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:thunderbird");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:thunderbird-bin");
script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Gentoo Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
exit(0);
}
include('qpkg.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item('Host/Gentoo/release')) audit(AUDIT_OS_NOT, 'Gentoo');
if (!get_kb_item('Host/Gentoo/qpkg-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var flag = 0;
var packages = [
{
'name' : 'mail-client/thunderbird',
'unaffected' : make_list("ge 102.10.0"),
'vulnerable' : make_list("lt 102.10.0")
},
{
'name' : 'mail-client/thunderbird-bin',
'unaffected' : make_list("ge 102.10.0"),
'vulnerable' : make_list("lt 102.10.0")
}
];
foreach var package( packages ) {
if (isnull(package['unaffected'])) package['unaffected'] = make_list();
if (isnull(package['vulnerable'])) package['vulnerable'] = make_list();
if (qpkg_check(package: package['name'] , unaffected: package['unaffected'], vulnerable: package['vulnerable'])) flag++;
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : qpkg_report_get()
);
exit(0);
}
else
{
qpkg_tests = list_uniq(qpkg_tests);
var tested = qpkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'Mozilla Thunderbird');
}
Vendor | Product | Version | CPE |
---|---|---|---|
gentoo | linux | thunderbird | p-cpe:/a:gentoo:linux:thunderbird |
gentoo | linux | thunderbird-bin | p-cpe:/a:gentoo:linux:thunderbird-bin |
gentoo | linux | cpe:/o:gentoo:linux |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25738
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25740
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25741
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28163
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28427
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550
bugs.gentoo.org/show_bug.cgi?id=895960
bugs.gentoo.org/show_bug.cgi?id=903619
bugs.gentoo.org/show_bug.cgi?id=905890
security.gentoo.org/glsa/202305-36