[ASA-201906-10] thunderbird: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Fri Jun 14 15:10:09 UTC 2019
Arch Linux Security Advisory ASA-201906-10
==========================================
Severity: High
Date : 2019-06-14
CVE-ID : CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-980
Summary
=======
The package thunderbird before version 60.7.1-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.
Resolution
==========
Upgrade to 60.7.1-1.
# pacman -Syu "thunderbird>=60.7.1-1"
The problems have been fixed upstream in version 60.7.1.
Workaround
==========
None.
Description
===========
- CVE-2019-11703 (arbitrary code execution)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in parser_get_next_char when processing certain
email messages, resulting in a potentially exploitable crash.
- CVE-2019-11704 (arbitrary code execution)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in icalmemory_strdup_and_dequote when processing
certain email messages, resulting in a potentially exploitable crash.
- CVE-2019-11705 (arbitrary code execution)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
stack buffer overflow in icalrecur_add_bydayrules when processing
certain email messages, resulting in a potentially exploitable crash.
- CVE-2019-11706 (denial of service)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
type confusion in icaltimezone_get_vtimezone_properties when processing
certain email messages, resulting in a crash.
Impact
======
A remote attacker can crash thunderbird or execute arbitrary code on
the affected host via a crafted email message.
References
==========
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11703
https://bugzilla.mozilla.org/show_bug.cgi?id=1553820
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11704
https://bugzilla.mozilla.org/show_bug.cgi?id=1553814
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11705
https://bugzilla.mozilla.org/show_bug.cgi?id=1553808
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11706
https://security.archlinux.org/CVE-2019-11703
https://security.archlinux.org/CVE-2019-11704
https://security.archlinux.org/CVE-2019-11705
https://security.archlinux.org/CVE-2019-11706
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190614/2153df9c/attachment.sig>
More information about the arch-security
mailing list