[ASA-201906-10] thunderbird: multiple issues

Remi Gacogne rgacogne at archlinux.org
Fri Jun 14 15:10:09 UTC 2019


Arch Linux Security Advisory ASA-201906-10
==========================================

Severity: High
Date    : 2019-06-14
CVE-ID  : CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706
Package : thunderbird
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-980

Summary
=======

The package thunderbird before version 60.7.1-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.

Resolution
==========

Upgrade to 60.7.1-1.

# pacman -Syu "thunderbird>=60.7.1-1"

The problems have been fixed upstream in version 60.7.1.

Workaround
==========

None.

Description
===========

- CVE-2019-11703 (arbitrary code execution)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in parser_get_next_char when processing certain
email messages, resulting in a potentially exploitable crash.

- CVE-2019-11704 (arbitrary code execution)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in icalmemory_strdup_and_dequote when processing
certain email messages, resulting in a potentially exploitable crash.

- CVE-2019-11705 (arbitrary code execution)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
stack buffer overflow in icalrecur_add_bydayrules when processing
certain email messages, resulting in a potentially exploitable crash.

- CVE-2019-11706 (denial of service)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
type confusion in icaltimezone_get_vtimezone_properties when processing
certain email messages, resulting in a crash.

Impact
======

A remote attacker can crash thunderbird or execute arbitrary code on
the affected host via a crafted email message.

References
==========

https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11703
https://bugzilla.mozilla.org/show_bug.cgi?id=1553820
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11704
https://bugzilla.mozilla.org/show_bug.cgi?id=1553814
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11705
https://bugzilla.mozilla.org/show_bug.cgi?id=1553808
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11706
https://security.archlinux.org/CVE-2019-11703
https://security.archlinux.org/CVE-2019-11704
https://security.archlinux.org/CVE-2019-11705
https://security.archlinux.org/CVE-2019-11706

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190614/2153df9c/attachment.sig>


More information about the arch-security mailing list