Lucene search

K
ubuntuUbuntuUSN-3660-1
HistoryMay 25, 2018 - 12:00 a.m.

Thunderbird vulnerabilities

2018-05-2500:00:00
ubuntu.com
57

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

Low

EPSS

0.123

Percentile

95.5%

Releases

  • Ubuntu 18.04 ESM
  • Ubuntu 17.10
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service
via application crash, install lightweight themes without user
interaction, or execute arbitrary code. (CVE-2018-5150, CVE-2018-5154,
CVE-2018-5155, CVE-2018-5159, CVE-2018-5168, CVE-2018-5178)

An issue was discovered when processing message headers in Thunderbird. If
a user were tricked in to opening a specially crafted message, an attacker
could potentially exploit this to cause a denial of service via
application hang. (CVE-2018-5161)

It was discovered encrypted messages could leak plaintext via the src
attribute of remote images or links. An attacker could potentially exploit
this to obtain sensitive information. (CVE-2018-5162)

It was discovered that the filename of an attachment could be spoofed. An
attacker could potentially exploit this by tricking the user in to opening
an attachment of a different type to the one expected. (CVE-2018-5170)

Multiple security issues were discovered in Skia. If a user were tricked
in to opening a specially crafted message, an attacker could potentially
exploit these to cause a denial of service via application crash, or
execute arbitrary code. (CVE-2018-5183)

It was discovered that S/MIME encrypted messages with remote content could
leak plaintext via a chosen-ciphertext attack. An attacker could
potentially exploit this to obtain sensitive information. (CVE-2018-5184)

It was discovered that plaintext of decrypted emails could leak by
submitting an embedded form. An attacker could potentially exploit this to
obtain sensitive information. (CVE-2018-5185)

OSVersionArchitecturePackageVersionFilename
Ubuntu18.04noarchthunderbird< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-dbg< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-dev< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-globalmenu< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-gnome-support< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-gnome-support-dbg< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-locale-af< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-locale-ar< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-locale-ast< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Ubuntu18.04noarchthunderbird-locale-be< 1:52.8.0+build1-0ubuntu0.18.04.1UNKNOWN
Rows per page:
1-10 of 3321

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

Low

EPSS

0.123

Percentile

95.5%