Arch Linux Security Advisory ASA-201701-40 ========================================== Severity: Critical Date : 2017-01-29 CVE-ID : CVE-2017-5373 CVE-2017-5375 CVE-2017-5376 CVE-2017-5378 CVE-2017-5380 CVE-2017-5383 CVE-2017-5390 CVE-2017-5396 Package : thunderbird Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-158 Summary ======= The package thunderbird before version 45.7.0-1 is vulnerable to multiple issues including arbitrary code execution, information disclosure, privilege escalation and content spoofing. Resolution ========== Upgrade to 45.7.0-1. # pacman -Syu "thunderbird>=45.7.0-1" The problems have been fixed upstream in version 45.7.0. Workaround ========== None. Description =========== - CVE-2017-5373 (arbitrary code execution) Several memory safety bugs have been found in Firefox < 51 and Thunderbird < 47.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. - CVE-2017-5375 (arbitrary code execution) JIT code allocation in Firefox < 51 and Thunderbird < 45.7 can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. - CVE-2017-5376 (arbitrary code execution) A use-after-free vulnerability has been found in Firefox < 51 and Thunderbird < 45.7, while manipulating XSL in XSLT documents. - CVE-2017-5378 (information disclosure) An information disclosure vulnerability has been found in Firefox < 51 and Thunderbird < 45.7, where hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object’s address can be discovered through hash codes, and also allows for data leakage of an object’s content using these hash codes. - CVE-2017-5380 (arbitrary code execution) A potential use-after-free vulnerability during DOM manipulation of SVG content has been in Firefox < 51 and Thunderbird < 45.7. - CVE-2017-5383 (content spoofing) URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display in Firefox < 51 and Thunderbird < 45.7, allowing for domain name spoofing attacks in the location bar. - CVE-2017-5390 (privilege escalation) The JSON viewer in the Developer Tools in Firefox < 51 and Thunderbird < 45.7 uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. - CVE-2017-5396 (arbitrary code execution) A use-after-free vulnerability has been found in the Media Decoder of Firefox < 51 and Thunderbird < 45.7, when working with media files when some events are fired after the media elements are freed from memory. Impact ====== A remote attacker can access sensitive information, spoof content, escalate privileges and execute arbitrary code on the affected host. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa2017-03 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5373 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%... https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375 https://bugzilla.mozilla.org/show_bug.cgi?id=1325200 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5376 https://bugzilla.mozilla.org/show_bug.cgi?id=1311687 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378 https://bugzilla.mozilla.org/show_bug.cgi?id=1312001 https://bugzilla.mozilla.org/show_bug.cgi?id=1330769 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5380 https://bugzilla.mozilla.org/show_bug.cgi?id=1322107 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5383 https://bugzilla.mozilla.org/show_bug.cgi?id=1323338 https://bugzilla.mozilla.org/show_bug.cgi?id=1324716 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5390 https://bugzilla.mozilla.org/show_bug.cgi?id=1297361 https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5396 https://bugzilla.mozilla.org/show_bug.cgi?id=1329403 https://security.archlinux.org/CVE-2017-5373 https://security.archlinux.org/CVE-2017-5375 https://security.archlinux.org/CVE-2017-5376 https://security.archlinux.org/CVE-2017-5378 https://security.archlinux.org/CVE-2017-5380 https://security.archlinux.org/CVE-2017-5383 https://security.archlinux.org/CVE-2017-5390 https://security.archlinux.org/CVE-2017-5396