SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
(Red Hat Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1034260
SecurityTracker URL:  http://securitytracker.com/id/1034260
CVE Reference:   CVE-2015-4513, CVE-2015-7189, CVE-2015-7193, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200   (Links to External Site)
Date:  Nov 26 2015
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can conduct cross-site scripting attacks. Mozilla Thunderbird is affected.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system [CVE-2015-4513, CVE-2015-4514].

A remote user can submit an NTLM request (via HTTP) to determine the hostname and potentially the Windows domain of the target system [CVE-2015-4515]

The Reader View does not properly disable script code in SVG animations in certain cases [CVE-2015-4518]. A remote user can bypass Reader mode security protections to potentially cause arbitrary scripting code to be executed by the target user's browser. The code will originate from an arbitrary site and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

On Firefox for Android, the system may not restore the address bar when exiting fullscreen mode. A remote user may be able to exploit this to spoof the addressbar [CVE-2015-7185].

On Firefox for Android, an application may be able to invoke "file://" URIs to download additional files or open cached profile data [CVE-2015-7186].

When a panel is created using the Add-on SDK in a browser extension with the "script: false" setting, the system may not disable the execution of inline script [CVE-2015-7187].

A user can append white-space characters to hostnames that are IP addresses to bypass same-origin policy and potentially conduct cross-site scripting attacks [CVE-2015-7188].

A remote user can trigger a buffer overflow in the JPEGEncoder function during script interactions with a canvas element and potentially execute arbitrary code [CVE-2015-7189].

On Firefox for Android, a remote user may be able to exploit a flaw in the Search feature to load a URL with system privileges and read arbitrary files on the target system [CVE-2015-7190].

On Firefox for Android, a remote user can exploit Android intents and fallback navigation to conduct cross-site scripting attacks [CVE-2015-7191].

On OS X systems, a remote user may be able to trigger an error when an accessibility tool requests the index of a table row through the NSAccessibilityIndexAttribute value and execute arbitrary code [CVE-2015-7192].

A remote user can trigger an error in the processing of cross-origin resource sharing (CORS) "preflight" requests to bypass same-origin policy [CVE-2015-7193].

A remote user can create a specially crafted ZIP file that, when processed by the target user, will trigger a buffer underflow in libjar (libxul) and potentially execute arbitrary code [CVE-2015-7194].

A remote user may be able to create a URL with certain escaped characters in the hostname to trigger a parsing error and potentially access site-specific tokens [CVE-2015-7195].

A remote user can cause the Java plugin to deallocate a JavaScript wrapper when it is still in use, leading to a JavaScript garbage collection crash and potentially to code execution [CVE-2015-7196]. Systems with Java installed an enabled as a browser plugin are affected.

Some flaws exist in the ANGLE graphics library, in SVG rendering, and in cryptographic key manipulation that could potentially execute arbitrary code [CVE-2015-7198, CVE-2015-7199, CVE-2015-7200]. A method to trigger these flaws has not been identified.

A web worker can bypass mixed content policy for WebSockets when workers are used to create WebSockets [CVE-2015-7197].

A remote user can trigger a buffer overflow in the ASN.1 decoder in Network Security Services (NSS) to execute arbitrary code [CVE-2015-7181, CVE-2015-7182, CVE-2015-7183].

Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, Gary Kwong, Andrew McCreight, Georg Fritzsche, Tyson Smith, Carsten Book, Tim Brown, Mario Heiderich, Frederik Braun,
Jordi Chancel, Jason Hamilton and Peter Arremann with AMO editor Sylvain Giroux, Michal Bentkowski, Looben Yang, Muneaki Nishimura, Frederic Wang, Shinto K Anto,
Gustavo Grieco, Frans Rosen, Vytautas Staraitis, Ronald Crane, Ehsan Akhgari, David Keeler, and Ryan Sleevi reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with an arbitrary site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:   Red Hat has issued a fix for CVE-2015-4513, CVE-2015-7189, CVE-2015-7193, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, and CVE-2015-7200 for Mozilla Thunderbird.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2015-2519.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2015-2519.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Nov 5 2015 Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks



 Source Message Contents

Subject:  [RHSA-2015:2519-01] Important: thunderbird security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: thunderbird security update
Advisory ID:       RHSA-2015:2519-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2015-2519.html
Issue date:        2015-11-26
CVE Names:         CVE-2015-4513 CVE-2015-7189 CVE-2015-7193 
                   CVE-2015-7197 CVE-2015-7198 CVE-2015-7199 
                   CVE-2015-7200 
=====================================================================

1. Summary:

An updated thunderbird package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 5, 6, and 7.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user running
Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197, CVE-2015-7198,
CVE-2015-7199, CVE-2015-7200)

A same-origin policy bypass flaw was found in the way Thunderbird handled
certain cross-origin resource sharing (CORS) requests. A web page
containing malicious content could cause Thunderbird to disclose sensitive
information. (CVE-2015-7193)

Note: All of the above issues cannot be exploited by a specially crafted
HTML mail message because JavaScript is disabled by default for mail
messages. However, they could be exploited in other ways in Thunderbird
(for example, by viewing the full remote content of an RSS feed).

Red Hat would like to thank the Mozilla project for reporting this issue.
Upstream acknowledges Christian Holler, David Major, Jesse Ruderman, Tyson
Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff
Walden, Gary Kwong, Looben Yang, Shinto K Anto, Ronald Crane, and Ehsan
Akhgari as the original reporters of these issues.

For technical details regarding these flaws, refer to the Mozilla security
advisories for Thunderbird 38.4.0. You can find a link to the Mozilla
advisories in the References section of this erratum.

All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 38.4.0, which corrects these issues. After
installing the update, Thunderbird must be restarted for the changes to
take effect.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1277332 - CVE-2015-4513 Mozilla: Miscellaneous memory safety hazards (rv:38.4) (MFSA 2015-116)
1277344 - CVE-2015-7189 Mozilla: Buffer overflow during image interactions in canvas (MFSA 2015-123)
1277346 - CVE-2015-7193 Mozilla: CORS preflight is bypassed when non-standard Content-Type headers are received (MFSA 2015-127)
1277350 - CVE-2015-7198 CVE-2015-7199 CVE-2015-7200 Mozilla: Vulnerabilities found through code inspection (MFSA 2015-131)
1277351 - CVE-2015-7197 Mozilla: Mixed content WebSocket policy bypass through workers (MFSA 2015-132)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
thunderbird-38.4.0-1.el5_11.src.rpm

i386:
thunderbird-38.4.0-1.el5_11.i386.rpm
thunderbird-debuginfo-38.4.0-1.el5_11.i386.rpm

x86_64:
thunderbird-38.4.0-1.el5_11.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el5_11.x86_64.rpm

RHEL Optional Productivity Applications (v. 5 server):

Source:
thunderbird-38.4.0-1.el5_11.src.rpm

i386:
thunderbird-38.4.0-1.el5_11.i386.rpm
thunderbird-debuginfo-38.4.0-1.el5_11.i386.rpm

x86_64:
thunderbird-38.4.0-1.el5_11.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el5_11.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
thunderbird-38.4.0-1.el6_7.src.rpm

i386:
thunderbird-38.4.0-1.el6_7.i686.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.i686.rpm

x86_64:
thunderbird-38.4.0-1.el6_7.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
thunderbird-38.4.0-1.el6_7.src.rpm

i386:
thunderbird-38.4.0-1.el6_7.i686.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.i686.rpm

ppc64:
thunderbird-38.4.0-1.el6_7.ppc64.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.ppc64.rpm

s390x:
thunderbird-38.4.0-1.el6_7.s390x.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.s390x.rpm

x86_64:
thunderbird-38.4.0-1.el6_7.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
thunderbird-38.4.0-1.el6_7.src.rpm

i386:
thunderbird-38.4.0-1.el6_7.i686.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.i686.rpm

x86_64:
thunderbird-38.4.0-1.el6_7.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el6_7.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source:
thunderbird-38.4.0-1.el7_2.src.rpm

x86_64:
thunderbird-38.4.0-1.el7_2.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

Source:
thunderbird-38.4.0-1.el7_2.src.rpm

aarch64:
thunderbird-38.4.0-1.el7_2.aarch64.rpm
thunderbird-debuginfo-38.4.0-1.el7_2.aarch64.rpm

ppc64le:
thunderbird-38.4.0-1.el7_2.ppc64le.rpm
thunderbird-debuginfo-38.4.0-1.el7_2.ppc64le.rpm

x86_64:
thunderbird-38.4.0-1.el7_2.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
thunderbird-38.4.0-1.el7_2.src.rpm

x86_64:
thunderbird-38.4.0-1.el7_2.x86_64.rpm
thunderbird-debuginfo-38.4.0-1.el7_2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-4513
https://access.redhat.com/security/cve/CVE-2015-7189
https://access.redhat.com/security/cve/CVE-2015-7193
https://access.redhat.com/security/cve/CVE-2015-7197
https://access.redhat.com/security/cve/CVE-2015-7198
https://access.redhat.com/security/cve/CVE-2015-7199
https://access.redhat.com/security/cve/CVE-2015-7200
https://access.redhat.com/security/updates/classification/#important
https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird38.4

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFWVxOoXlSAg2UNWIIRAlVdAKCxjI/GR+wq1qDd5sD8NvHFHErztwCfbjkp
7NfGxszglQ4aArlQrhRWiiM=
=GCT8
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC