Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2020-15673 CVE-2020-15676 CVE-2020-15677 CVE-2020-15678 |
CWE-ID | CWE-119 CWE-79 CWE-451 CWE-416 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
thunderbird (Debian package) Operating systems & Components / Operating system package or component |
Vendor | Debian |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU46966
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-15673
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate thunderbird package to version 1:78.3.1-2~deb10u2.
Vulnerable software versionsthunderbird (Debian package): 1:60.8.0-1~deb10u1 - 68.12.0-1~deb10u1
CPE2.3http://www.debian.org/security/2020/dsa-4770
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU46964
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-15676
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationUpdate thunderbird package to version 1:78.3.1-2~deb10u2.
Vulnerable software versionsthunderbird (Debian package): 1:60.8.0-1~deb10u1 - 68.12.0-1~deb10u1
CPE2.3http://www.debian.org/security/2020/dsa-4770
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU46963
Risk: Low
CVSSv3.1: 3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-15677
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The
vulnerability exists due to way Firefox displays name of the data
origin when downloading files. A remote attacker can spoof origin of the
downloaded file and display the name of the intermediate website instead of the original source name.
Successful exploitation of this
vulnerability may allow a remote attacker to perform a phishing attack but requires that the spoofed website has an open redirect vulnerability.
Update thunderbird package to version 1:78.3.1-2~deb10u2.
Vulnerable software versionsthunderbird (Debian package): 1:60.8.0-1~deb10u1 - 68.12.0-1~deb10u1
CPE2.3http://www.debian.org/security/2020/dsa-4770
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU46965
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-15678
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content. When recursing through graphical layers while scrolling, an iterator may
have become invalid, resulting in a potential use-after-free. This
occurs because the function APZCTreeManager::ComputeClippedCompositionBounds
did not follow iterator invalidation rules.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate thunderbird package to version 1:78.3.1-2~deb10u2.
Vulnerable software versionsthunderbird (Debian package): 1:60.8.0-1~deb10u1 - 68.12.0-1~deb10u1
CPE2.3http://www.debian.org/security/2020/dsa-4770
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.