Lucene search

K
redhatRedHatRHSA-2020:5236
HistoryNov 30, 2020 - 8:18 a.m.

(RHSA-2020:5236) Important: thunderbird security update

2020-11-3008:18:50
access.redhat.com
87
thunderbird
security update
version 78.5.0
vulnerability fixes
mozilla
cve-2020-26951
cve-2020-26968
cve-2020-16012
cve-2020-26953
cve-2020-26956
cve-2020-26958
cve-2020-26959
cve-2020-26960
cve-2020-26961
cve-2020-26965
unix

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

75.7%

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.5.0.

Security Fix(es):

  • Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951)

  • Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968)

  • Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012)

  • Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953)

  • Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956)

  • Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958)

  • Mozilla: Use-after-free in WebRequestService (CVE-2020-26959)

  • Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960)

  • Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961)

  • Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

75.7%