Mozilla Thunderbird Flaws Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Request Forgery Attacks
|
SecurityTracker Alert ID: 1032000 |
SecurityTracker URL: http://securitytracker.com/id/1032000
|
CVE Reference:
CVE-2015-0801, CVE-2015-0807, CVE-2015-0813, CVE-2015-0814, CVE-2015-0815, CVE-2015-0816
(Links to External Site)
|
Date: Apr 1 2015
|
Impact:
Execution of arbitrary code via network, Modification of user information, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 31.6
|
Description:
Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site request forgery attacks. A remote user can bypass same-origin policy.
A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2015-0814, CVE-2015-0815].
A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free memory error in the AppendElements() function in the Fluendo MP3 GStreamer plugin and execute arbitrary code on the target system [CVE-2015-0813]. Only Linux-based systems are affected.
A remote user can load a document via a 'resource:' URL to bypass same-origin policy and load privileged chrome pages and execute arbitrary code [CVE-2015-0816].
A remote user can exploit a flaw in the processing of cross-origin resource sharing (CORS) requests to potentially conduct cross-site request forgery (XSRF) attacks [CVE-2015-0807].
A remote user can exploit a anchor navigation flaw in SVG content navigation to bypass same-origin policy [CVE-2015-0801].
Christian Holler, Byron Campen, Andrew McCreight, Gary Kwong, Karl Tomlinson, Randell Jesup, Shu-yu Guo, Steve Fink, Tooru Fujisawa, Aki Helin, Mariusz Mlynski (HP Zero Day Initiative's Pwn2Own contest), Christoph Kerschbaumer, Muneaki Nishimura, Olli Pettay, and Boris Zbarsky reported these vulnerabilities.
|
Impact:
A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
A remote user can conduct cross-site request forgery attacks.
A remote user can bypass same-origin policy.
|
Solution:
The vendor has issued a fix (31.6).
The vendor's advisories are available at:
https://www.mozilla.org/en-US/security/advisories/mfsa2015-30/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-31/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-33/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-37/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-40/
|
Vendor URL: www.mozilla.org/en-US/security/advisories/mfsa2015-30/ (Links to External Site)
|
Cause:
Access control error, Boundary error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|