SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
Mozilla Thunderbird Multiple Bugs Let Local Users Gain Elevated Privileges and Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
SecurityTracker Alert ID:  1029930
SecurityTracker URL:  http://securitytracker.com/id/1029930
CVE Reference:   CVE-2014-1493, CVE-2014-1494, CVE-2014-1496, CVE-2014-1497, CVE-2014-1499, CVE-2014-1505, CVE-2014-1508, CVE-2014-1509, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512, CVE-2014-1513, CVE-2014-1514   (Links to External Site)
Date:  Mar 19 2014
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 24.4
Description:   Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions. A local user can obtain elevated privileges on the target system. A remote user can obtain potentially sensitive information.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2014-1493, CVE-2014-1494].

Extracted update files are not set with read-only permissions [CVE-2014-1496]. A local user can modify files during the update process to execute arbitrary code on the target system with elevated privileges.

A specially crafted WAV file can access heap memory or cause a crash [CVE-2014-1497].

A remote user can exploit a flaw in the permission prompt for a WebRTC session to masquerade as an arbitrary site to potentially gain access to the target user's camera or microphone [CVE-2014-1499].

A remote user can exploit a timing flaw involving SVG filters and displacements to potentially access information from a different domain [CVE-2014-1505].

An application can trigger an out-of-bounds memory read when rendering polygons [CVE-2014-1508].

A remote user can create a specially crafted font to trigger a memory memory corruption flaw in the Cairo graphics library (if implemented in an extension) and potentially execute arbitrary code [CVE-2014-1509].

A remote user can load a chrome-privileged page [CVE-2014-1510].

A remote user can bypass the popup-blocker [CVE-2014-1511].

A remote user can trigger a use-after-free memory error during Garbage Collection to execute arbitrary code [CVE-2014-1512].

A remote user can exploit a flaw in the TypedArrayObject class to execute arbitrary code [CVE-2014-1513].

A remote user can trigger an out-of-bounds write to memory in 'vmtypedarrayobject.cpp' to execute arbitrary code [CVE-2014-1514].

Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman, Dan Gohman, Christoph Diehl, Gregor Wagner, Gary Kwong, Luke Wagner, Rob Fletcher, Makoto Kato, Ash, Atte Kettunen from OUSPG, Ehsan Akhgari, Tyson Smith and Jesse Schwartzentruber of the BlackBerry Security Automated Analysis Team, John Thomson, Robert O'Callahan, Mariusz Mlynski (via
TippingPoint's Pwn2Own contest), VUPEN (via TippingPoint's Pwn2Own contest), Juri Aedla (via TippingPoint's Pwn2Own contest), and George Hotz (via TippingPoint's Pwn2Own contest) reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can cause denial of service conditions.

A local user can obtain elevated privileges on the target system.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix (24.4).

The vendor's advisories are available at:

http://www.mozilla.org/security/announce/2014/mfsa2014-15.html
http://www.mozilla.org/security/announce/2014/mfsa2014-16.html
http://www.mozilla.org/security/announce/2014/mfsa2014-17.html
http://www.mozilla.org/security/announce/2014/mfsa2014-19.html
http://www.mozilla.org/security/announce/2014/mfsa2014-26.html
http://www.mozilla.org/security/announce/2014/mfsa2014-27.html
http://www.mozilla.org/security/announce/2014/mfsa2014-28.html
http://www.mozilla.org/security/announce/2014/mfsa2014-29.html
http://www.mozilla.org/security/announce/2014/mfsa2014-30.html
http://www.mozilla.org/security/announce/2014/mfsa2014-31.html
http://www.mozilla.org/security/announce/2014/mfsa2014-32.html

Vendor URL:  www.mozilla.org/security/announce/2014/mfsa2014-15.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 19 2014 (Red Hat Issues Fix) Mozilla Thunderbird Multiple Bugs Let Local Users Gain Elevated Privileges and Remote Users Execute Arbitrary Code, Deny Service, and Obtain Information
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC