[arch-security] [ASA-201505-13] thunderbird: multiple issues
rgacogne at archlinux.org
Mon May 18 10:00:36 UTC 2015
Arch Linux Security Advisory ASA-201505-13
Date : 2015-05-18
CVE-ID : CVE-2015-2708 CVE-2015-2709 CVE-2015-2710 CVE-2015-2713
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package thunderbird before version 31.7.0-1 is vulnerable to
Upgrade to 31.7.0-1.
# pacman -Syu "thunderbird>=31.7.0-1"
The problem has been fixed upstream in version 31.7.0.
CVE-2015-2708, CVE-2015-2709, CVE-2015-2710 and CVE-2015-2716 cannot be
exploited through email in the Thunderbird product because scripting is
disabled, but are potentially a risk in browser or browser-like contexts.
There is no workaround for CVE-2015-2713.
- CVE-2015-2708 (Memory safety bugs fixed in Firefox ESR 31.7 and
Jesse Ruderman, Mats Palmgren, Byron Campen, and Steve Fink reported
memory safety problems and crashes that affect Firefox ESR 31.6 and
- CVE-2015-2709 (Memory safety bugs fixed in Firefox 38):
Gary Kwong, Andrew McCreight, Christian Holler, Jesse Ruderman, Mats
Palmgren, Jon Coppeard, and Milan Sreckovic reported memory safety
problems and crashes that affect Firefox 37.
- CVE-2015-2710 (Buffer overflow with SVG content and CSS):
Using the Address Sanitizer tool, security researcher Atte Kettunen
found a buffer overflow during the rendering of SVG format graphics when
combined with specific CSS properties on a page. This results in a
potentially exploitable crash.
- CVE-2015-2713 (Use-after-free during text processing with vertical
Security researcher Scott Bell used the Address Sanitizer tool to
discover a use-after-free error during the processing of text when
vertical text is enabled. This leads to a potentially exploitable crash.
- CVE-2015-2716 (Buffer overflow when parsing compressed XML):
Security researcher Ucha Gobejishvili used the Address Sanitizer tool to
find a buffer overflow while parsing compressed XML content. This was
due to an error in how buffer space is created and modified when
handling large amounts of XML data. This results in a potentially
A remote attacker can execute arbitrary code with the privileges of the
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: OpenPGP digital signature
More information about the arch-security