[MFSA-2017-09] Security vulnerabilities fixed in - Thunderbird 52

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 23

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

  • CVE-2017-5398: Memory safety bugs fixed in Thunderbird 52 and Thunderbird 45.8 (critical)
    Mozilla developers and community members Boris Zbarsky, Christian Holler, Honza Bambas, Jon Coppeard, Randell Jesup, André Bargull, Kan-Ru Chen, and Nathan Froyd reported memory safety bugs present in Firefox 51 and Firefox ESR 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

  • CVE-2017-5399: Memory safety bugs fixed in Thunderbird 52 (critical)
    Mozilla developers and community members Carsten Book, Calixte Denizet, Christian Holler, Andrew McCreight, David Bolter, David Keeler, Jon Coppeard, Tyson Smith, Ronald Crane, Tooru Fujisawa, Ben Kelly, Bob Owen, Jed Davis, Julian Seward, Julian Hector, Philipp, Markus Stange, and André Bargull reported memory safety bugs present in Firefox 51. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

  • CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP (critical)
    JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks.

  • CVE-2017-5401: Memory Corruption when handling ErrorResult (critical)
    A crash triggerable by web content in which an <code>ErrorResult</code> references unassigned memory due to a logic error. The resulting crash may be exploitable.

  • CVE-2017-5402: Use-after-free working with events in FontFace objects (critical)
    A use-after-free can occur when events are fired for a <code>FontFace</code> object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash.

  • CVE-2017-5403: Use-after-free using addRange to add range to an incorrect root object (critical)
    When adding a range to an object in the DOM, it is possible to use <code>addRange</code> to add the range to an incorrect root object. This triggers a use-after-free, resulting in a potentially exploitable crash.

  • CVE-2017-5404: Use-after-free working with ranges in selections (critical)
    A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash.

  • CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports (low)
    Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations.

  • CVE-2017-5406: Segmentation fault in Skia with canvas operations (high)
    A segmentation fault can occur in the Skia graphics library during some canvas operations due to issues with mask/clip intersection and empty masks.

  • CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters (high)
    Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure.

  • CVE-2017-5408: Cross-origin reading of video captions in violation of CORS (moderate)
    Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions.

  • CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping (high)
    Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup.

  • CVE-2017-5411: Use-after-free in Buffer Storage in libGLES (high)
    A use-after-free can occur during buffer storage operations within the ANGLE graphics library, used for WebGL content. The buffer storage can be freed while still in use in some circumstances, leading to a potentially exploitable crash.
    Note: This issue is in <code>libGLES</code>, which is only in use on Windows. Other operating systems are not affected.

  • CVE-2017-5412: Buffer overflow read in SVG filters (moderate)
    A buffer overflow read during SVG filter color value operations, resulting in data exposure.

  • CVE-2017-5413: Segmentation fault during bidirectional operations (moderate)
    A segmentation fault can occur during some bidirectional layout operations.

  • CVE-2017-5414: File picker can choose incorrect default directory (moderate)
    The file picker dialog can choose and display the wrong local default directory when instantiated. On some operating systems, this can lead to information disclosure, such as the operating system or the local account name.

  • CVE-2017-5416: Null dereference crash in HttpChannel (moderate)
    In certain circumstances a networking event listener can be prematurely released. This appears to result in a null dereference in practice.

  • CVE-2017-5418: Out of bounds read when parsing HTTP digest authorization responses (low)
    An out of bounds read error occurs when parsing some HTTP digest authorization responses, resulting in information leakage through the reading of random memory containing matches to specifically set patterns.

  • CVE-2017-5419: Repeated authentication prompts lead to DOS attack (low)
    If a malicious site repeatedly triggers a modal authentication prompt, eventually the browser UI will become non-responsive, requiring shutdown through the operating system. This is a denial of service (DOS) attack.

  • CVE-2017-5421: Print preview spoofing (low)
    A malicious site could spoof the contents of the print preview window if popup windows are enabled, resulting in user confusion of what site is currently loaded.

  • CVE-2017-5422: DOS attack by using view-source: protocol repeatedly in one hyperlink (low)
    If a malicious site uses the <code>view-source:</code> protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hyperlink is selected. This was fixed by no longer making <code>view-source:</code> linkable.

  • CVE-2017-5425: Overly permissive Gecko Media Plugin sandbox regular expression access (moderate)
    The Gecko Media Plugin sandbox allows access to local files that match specific regular expressions. On OS OX, this matching allows access to some data in subdirectories of <code>/private/var</code> that could expose personal or temporary data. This has been updated to not allow access to <code>/private/var</code> and its subdirectories.
    Note: this issue only affects OS X. Other operating systems are not affected.

  • CVE-2017-5426: Gecko Media Plugin sandbox is not started if seccomp-bpf filter is running (moderate)
    On Linux, if the secure computing mode BPF (seccomp-bpf) filter is running when the Gecko Media Plugin sandbox is started, the sandbox fails to be applied and items that would run within the sandbox are run protected only by the running filter which is typically weak compared to the sandbox.
    Note: this issue only affects Linux. Other operating systems are not affected.

Package Affected Version
pkg:mozilla/Thunderbird < 52
Package Fixed Version
pkg:mozilla/Thunderbird = 52
Source # ID Name URL
Bugzilla 1332550 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1332550
Bugzilla 1332597 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1332597
Bugzilla 1338383 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1338383
Bugzilla 1321612 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1321612
Bugzilla 1322971 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1322971
Bugzilla 1333568 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1333568
Bugzilla 1333887 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1333887
Bugzilla 1335450 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1335450
Bugzilla 1325052 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1325052
Bugzilla 1324379 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1324379
Bugzilla 1336510 Memory safety bugs fixed in Thunderbird 52 and Thunderbird ESR 45.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1336510
Bugzilla 1332569 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1332569
Bugzilla 1315248 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1315248
Bugzilla 1261335 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1261335
Bugzilla 1321038 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1321038
Bugzilla 1331771 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1331771
Bugzilla 1339566 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1339566
Bugzilla 1339591 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1339591
Bugzilla 1240893 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1240893
Bugzilla 1341905 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1341905
Bugzilla 1323241 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1323241
Bugzilla 1336467 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1336467
Bugzilla 1270288 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1270288
Bugzilla 1295299 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1295299
Bugzilla 1296024 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1296024
Bugzilla 1304201 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1304201
Bugzilla 1306142 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1306142
Bugzilla 1307557 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1307557
Bugzilla 1308036 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1308036
Bugzilla 1334246 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1334246
Bugzilla 1334290 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1334290
Bugzilla 1317085 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1317085
Bugzilla 1339116 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1339116
Bugzilla 1324000 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1324000
Bugzilla 1323150 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1323150
Bugzilla 1332501 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1332501
Bugzilla 1320894 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1320894
Bugzilla 1333752 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1333752
Bugzilla 1303713 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1303713
Bugzilla 1321566 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1321566
Bugzilla 1264053 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1264053
Bugzilla 1343513 Memory safety bugs fixed in Thunderbird 52 https://bugzilla.mozilla.org/show_bug.cgi?id=1343513
Bugzilla 1334933 https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
Bugzilla 1328861 https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
Bugzilla 1334876 https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
Bugzilla 1340186 https://bugzilla.mozilla.org/show_bug.cgi?id=1340186
Bugzilla 1340138 https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
Bugzilla 1336699 https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
Bugzilla 1306890 https://bugzilla.mozilla.org/show_bug.cgi?id=1306890
Bugzilla 1336622 https://bugzilla.mozilla.org/show_bug.cgi?id=1336622
Bugzilla 1313711 https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
Bugzilla 1330687 https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
Bugzilla 1325511 https://bugzilla.mozilla.org/show_bug.cgi?id=1325511
Bugzilla 1328323 https://bugzilla.mozilla.org/show_bug.cgi?id=1328323
Bugzilla 1337504 https://bugzilla.mozilla.org/show_bug.cgi?id=1337504
Bugzilla 1319370 https://bugzilla.mozilla.org/show_bug.cgi?id=1319370
Bugzilla 1328121 https://bugzilla.mozilla.org/show_bug.cgi?id=1328121
Bugzilla 1338876 https://bugzilla.mozilla.org/show_bug.cgi?id=1338876
Bugzilla 1312243 https://bugzilla.mozilla.org/show_bug.cgi?id=1312243
Bugzilla 1301876 https://bugzilla.mozilla.org/show_bug.cgi?id=1301876
Bugzilla 1295002 https://bugzilla.mozilla.org/show_bug.cgi?id=1295002
Bugzilla 1322716 https://bugzilla.mozilla.org/show_bug.cgi?id=1322716
Bugzilla 1257361 https://bugzilla.mozilla.org/show_bug.cgi?id=1257361
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:mozilla/Thunderbird Thunderbird < 52
Fixed pkg:mozilla/Thunderbird Thunderbird = 52
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...