CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
97.6%
It was discovered that Message ID calculation was based on uninitialized
data. An attacker could potentially exploit this to obtain sensitive
information. (CVE-2020-6792)
Mutiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted message, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, or execute arbitrary code. (CVE-2020-6793, CVE-2020-6795,
CVE-2020-6822)
It was discovered that if a user saved passwords before Thunderbird 60
and then later set a master password, an unencrypted copy of these
passwords would still be accessible. A local user could exploit this to
obtain sensitive information. (CVE-2020-6794)
Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
conduct cross-site scripting (XSS) attacks, obtain sensitive information,
or execute arbitrary code. (CVE-2019-20503, CVE-2020-6798, CVE-2020-6800,
CVE-2020-6805, CVE-2020-6806, CVE-2020-6807, CVE-2020-6812, CVE-2020-6814,
CVE-2020-6819, CVE-2020-6820, CVE-2020-6821, CVE-2020-6825)
It was discovered that the Devtools’ ‘Copy as cURL’ feature did not
fully escape website-controlled data. If a user were tricked in to using
the ‘Copy as cURL’ feature to copy and paste a command with specially
crafted data in to a terminal, an attacker could potentially exploit this
to execute arbitrary commands via command injection. (CVE-2020-6811)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 19.10 | noarch | thunderbird | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-dbg | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-dev | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-gnome-support | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-gnome-support-dbg | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-locale-af | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-locale-ar | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-locale-ast | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-locale-be | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | thunderbird-locale-bg | < 1:68.7.0+build1-0ubuntu0.19.10.1 | UNKNOWN |
ubuntu.com/security/CVE-2019-20503
ubuntu.com/security/CVE-2020-6792
ubuntu.com/security/CVE-2020-6793
ubuntu.com/security/CVE-2020-6794
ubuntu.com/security/CVE-2020-6795
ubuntu.com/security/CVE-2020-6798
ubuntu.com/security/CVE-2020-6800
ubuntu.com/security/CVE-2020-6805
ubuntu.com/security/CVE-2020-6806
ubuntu.com/security/CVE-2020-6807
ubuntu.com/security/CVE-2020-6811
ubuntu.com/security/CVE-2020-6812
ubuntu.com/security/CVE-2020-6814
ubuntu.com/security/CVE-2020-6819
ubuntu.com/security/CVE-2020-6820
ubuntu.com/security/CVE-2020-6821
ubuntu.com/security/CVE-2020-6822
ubuntu.com/security/CVE-2020-6825
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
97.6%