Lucene search

K
ubuntuUbuntuUSN-6515-1
HistoryNov 27, 2023 - 12:00 a.m.

Thunderbird vulnerabilities

2023-11-2700:00:00
ubuntu.com
14
ubuntu
thunderbird
security issues
denial of service
sensitive information
security restrictions
arbitrary code
memory management
browsing context
cross-site tracing
cve-2023-6204
cve-2023-6205
cve-2023-6206
cve-2023-6207
cve-2023-6208
cve-2023-6209
open source
newsgroup client

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

Releases

  • Ubuntu 23.10
  • Ubuntu 23.04
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-6206, CVE-2023-6212)

It was discovered that Thudnerbird did not properly manage memory when
images were created on the canvas element. An attacker could potentially
exploit this issue to obtain sensitive information. (CVE-2023-6204)

It discovered that Thunderbird incorrectly handled certain memory when
using a MessagePort. An attacker could potentially exploit this issue to
cause a denial of service. (CVE-2023-6205)

It discovered that Thunderbird incorrectly did not properly manage ownership
in ReadableByteStreams. An attacker could potentially exploit this issue
to cause a denial of service. (CVE-2023-6207)

It discovered that Thudnerbird incorrectly did not properly manage copy
operations when using Selection API in X11. An attacker could potentially
exploit this issue to obtain sensitive information. (CVE-2023-6208)

Rachmat Abdul Rokhim discovered that Thunderbird incorrectly handled
parsing of relative URLS starting with “///”. An attacker could potentially
exploit this issue to cause a denial of service. (CVE-2023-6209)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchthunderbird< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-dbg< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-dev< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-gnome-support< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-gnome-support-dbg< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-af< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-ar< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-ast< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-be< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Ubuntu23.10noarchthunderbird-locale-bg< 1:115.5.0+build1-0ubuntu0.23.10.1UNKNOWN
Rows per page:
1-10 of 3641

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%