USN-3927-1: Thunderbird vulnerabilities
28 March 2019
Several security issues were fixed in Thunderbird.
- thunderbird - Mozilla Open Source mail and newsgroup client
It was discovered that Thunderbird allowed PAC files to specify that
requests to localhost are sent through the proxy to another server. If
proxy auto-detection is enabled, an attacker could potentially exploit
this to conduct attacks on local services and tools. (CVE-2018-18506)
Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
or execute arbitrary code. (CVE-2019-9788, CVE-2019-9790, CVE-2019-9791,
CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813)
A mechanism was discovered that removes some bounds checking for string,
array, or typed array accesses if Spectre mitigations have been disabled.
If a user were tricked in to opening a specially crafted website in a
browsing context with Spectre mitigations disabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2019-9793)
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to restart Thunderbird to make
all the necessary changes.