[MFSA-2019-20] Security vulnerabilities fixed in Thunderbird 60.7.2

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 2

In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

  • CVE-2019-11707: Type confusion in Array.pop (critical)
    A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in <code>Array.pop</code>. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.

  • CVE-2019-11708: sandbox escape using Prompt:Open (high)
    Insufficient vetting of parameters passed with the <code>Prompt:Open</code> IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.

Package Affected Version
pkg:mozilla/Thunderbird < 60.7.2
Package Fixed Version
pkg:mozilla/Thunderbird = 60.7.2
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:mozilla/Thunderbird Thunderbird < 60.7.2
Fixed pkg:mozilla/Thunderbird Thunderbird = 60.7.2
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...