Mozilla Thunderbird is vulnerable to buffer overflow vulnerability. This occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. An incorrect value being passed within the library during checks and results in a potentially exploitable crash.
www.securityfocus.com/bid/101053
www.securitytracker.com/id/1039465
access.redhat.com/errata/RHSA-2017:2831
access.redhat.com/errata/RHSA-2017:2885
access.redhat.com/security/updates/classification/#important
bugzilla.mozilla.org/show_bug.cgi?id=1398381
lists.debian.org/debian-lts-announce/2017/11/msg00000.html
security.gentoo.org/glsa/201803-14
www.debian.org/security/2017/dsa-3987
www.debian.org/security/2017/dsa-4014
www.mozilla.org/en-US/security/advisories/mfsa2017-23/
www.mozilla.org/security/advisories/mfsa2017-21/
www.mozilla.org/security/advisories/mfsa2017-22/
www.mozilla.org/security/advisories/mfsa2017-23/