SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
(Red Hat Issues Fix for Mozilla Thunderbird) Mozilla Firefox Multiple Bugs Let Remote Users Bypass Security Restrictions, Spoof URLs, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID:  1037766
SecurityTracker URL:  http://securitytracker.com/id/1037766
CVE Reference:   CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5390, CVE-2017-5396   (Links to External Site)
Date:  Feb 2 2017
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can gain elevated privileges. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can spoof URLs. Mozilla Thunderbird is affected.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A use-after-free memory error may occur in XSL when processing XSLT documents [CVE-2017-5376].

A memory corruption error may occur in Skia when using transforms to make gradients [CVE-2017-5377].

A use-after-free memory error may occur in Web Animations when interacting with cycle collection [CVE-2017-5379].

A use-after-free memory error may occur in processing SVG content [CVE-2017-5380].

A use-after-free memory error may occur in Media Decoder [CVE-2017-5396].

A remote user can exploit a proxy object thread reference flaw to potentially execute arbitrary code [CVE-2017-5392]. Android systems are affected.

Various memory corruption errors may occur [CVE-2017-5373, CVE-2017-5374].

A remote user can spoof URLs using certain unicode glyphs for alternative hyphens and quotes [CVE-2017-5383].

A remote user can spoof URLs [CVE-2017-5394, CVE-2017-5395]. Android systems are affected.

A remote user can can exploit a JIT code allocation flaw to bypass address space layout randomization (ASLR) and data execution prevention (DEP) security features [CVE-2017-5375].

A remote user can determine an object's address via shared hash codes [[CVE-2017-5378].

A remote user that can monitor the network may be able to view potentially sensitive information in JSON and HTTP headers sent to the target user's JSON viewer in Developer Tools [CVE-2017-5390].

A remote user can cause the Certificate Viewer to save an exported certificate to arbitrary filesystem locations [CVE-2017-5381].

A remote user can exploit a flaw in the feed preview feature for RSS feeds to view errors and exceptions generated by privileged content [CVE-2017-5382].

A remote user can exploit a Proxy Auto-Config bug to obtain potentially sensitive information [CVE-2017-5384].

The browser may ignore the referrer-policy response header in certain cases [CVE-2017-5385]. As a result, a remote user can obtain potentially sensitive information.

A specially crafted WebExtension script can invoke the 'data:' protocol to access data from pages loaded by other web extensions or gain elevated privileges [CVE-2017-5386].

A specially crafted 'about:' page can load privileged 'about:' pages to potentially gain elevated privileges [CVE-2017-5391].

A specially crafted extension can invoke mozAddonManager to install additional extensions [CVE-2017-5393].

A specially crafted CSP header can invoke the mozAddonManager API to install additional add-ons [CVE-2017-5389].

A remote user can invoke TRACK tag errors to determine if a specified file exists on the target system [CVE-2017-5387].

A remote user can use a STUN server in conjunction with a large number of webkitRTCPeerConnection objects to conduct denial of service attacks against other systems [CVE-2017-5388]. e10s systems are affected.

Andrew McCreight, Andre Bargull, Armin Razmjou, Atte Kettunen, Carsten Book, Chris Pearce, Christian Holler, Cullen Jennings, Esther Monchari, Filipe Gomes, Gary Kwong, Honza Bambas, Jan de Mooij, Jann Horn, Jerri Rice, Jordi Chancel, Julian Seward, Kris Maglione, Muneaki Nishimura, Mustafa Hasan, Nicolas Gregoire, Nicolas Pierron, Nils, Olli Pettay, Oriol, Paul Stone, Alex Chapman, Philipp, Randell Jesup, Rh0, Ronald Crane, Stuart Colville, Tom Schuster, and Tooru Fujisawa reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can gain elevated privileges on the target system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can spoof a URL.

Solution:   Red Hat has issued a fix for CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5390, and CVE-2017-5396 for Mozilla Thunderbird.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2017-0238.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2017-0238.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, Resource error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  5, 6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Jan 25 2017 Mozilla Firefox Multiple Bugs Let Remote Users Bypass Security Restrictions, Spoof URLs, Obtain Potentially Sensitive Information, and Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2017:0238-01] Important: thunderbird security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: thunderbird security update
Advisory ID:       RHSA-2017:0238-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2017-0238.html
Issue date:        2017-02-02
CVE Names:         CVE-2017-5373 CVE-2017-5375 CVE-2017-5376 
                   CVE-2017-5378 CVE-2017-5380 CVE-2017-5383 
                   CVE-2017-5390 CVE-2017-5396 
=====================================================================

1. Summary:

An update for thunderbird is now available for Red Hat Enterprise Linux 5,
Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server) - i386, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 45.7.0.

Security Fix(es):

* Multiple flaws were found in the processing of malformed web content. A
web page containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user running
Thunderbird. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378,
CVE-2017-5380, CVE-2017-5383, CVE-2017-5390, CVE-2017-5396)

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Jann Horn, Filipe Gomes, Nils, Armin Razmjou,
Christian Holler, Gary Kwong, Andre Bargull, Jan de Mooij, Tom Schuster,
Oriol, Rh0, Nicolas Gregoire, and Jerri Rice as the original reporters.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of Thunderbird must be restarted for the update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1415924 - CVE-2017-5373 Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01)
1416271 - CVE-2017-5375 Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02)
1416272 - CVE-2017-5376 Mozilla: Use-after-free in XSL (MFSA 2017-02)
1416273 - CVE-2017-5378 Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02)
1416274 - CVE-2017-5380 Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02)
1416279 - CVE-2017-5390 Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02)
1416280 - CVE-2017-5396 Mozilla: Use-after-free with Media Decoder (MFSA 2017-02)
1416281 - CVE-2017-5383 Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
thunderbird-45.7.0-1.el5_11.src.rpm

i386:
thunderbird-45.7.0-1.el5_11.i386.rpm
thunderbird-debuginfo-45.7.0-1.el5_11.i386.rpm

x86_64:
thunderbird-45.7.0-1.el5_11.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el5_11.x86_64.rpm

Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server):

Source:
thunderbird-45.7.0-1.el5_11.src.rpm

i386:
thunderbird-45.7.0-1.el5_11.i386.rpm
thunderbird-debuginfo-45.7.0-1.el5_11.i386.rpm

x86_64:
thunderbird-45.7.0-1.el5_11.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el5_11.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
thunderbird-45.7.0-1.el6_8.src.rpm

i386:
thunderbird-45.7.0-1.el6_8.i686.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.i686.rpm

x86_64:
thunderbird-45.7.0-1.el6_8.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
thunderbird-45.7.0-1.el6_8.src.rpm

i386:
thunderbird-45.7.0-1.el6_8.i686.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.i686.rpm

ppc64:
thunderbird-45.7.0-1.el6_8.ppc64.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.ppc64.rpm

s390x:
thunderbird-45.7.0-1.el6_8.s390x.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.s390x.rpm

x86_64:
thunderbird-45.7.0-1.el6_8.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
thunderbird-45.7.0-1.el6_8.src.rpm

i386:
thunderbird-45.7.0-1.el6_8.i686.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.i686.rpm

x86_64:
thunderbird-45.7.0-1.el6_8.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el6_8.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source:
thunderbird-45.7.0-1.el7_3.src.rpm

x86_64:
thunderbird-45.7.0-1.el7_3.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

Source:
thunderbird-45.7.0-1.el7_3.src.rpm

aarch64:
thunderbird-45.7.0-1.el7_3.aarch64.rpm
thunderbird-debuginfo-45.7.0-1.el7_3.aarch64.rpm

ppc64le:
thunderbird-45.7.0-1.el7_3.ppc64le.rpm
thunderbird-debuginfo-45.7.0-1.el7_3.ppc64le.rpm

x86_64:
thunderbird-45.7.0-1.el7_3.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el7_3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
thunderbird-45.7.0-1.el7_3.src.rpm

x86_64:
thunderbird-45.7.0-1.el7_3.x86_64.rpm
thunderbird-debuginfo-45.7.0-1.el7_3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-5373
https://access.redhat.com/security/cve/CVE-2017-5375
https://access.redhat.com/security/cve/CVE-2017-5376
https://access.redhat.com/security/cve/CVE-2017-5378
https://access.redhat.com/security/cve/CVE-2017-5380
https://access.redhat.com/security/cve/CVE-2017-5383
https://access.redhat.com/security/cve/CVE-2017-5390
https://access.redhat.com/security/cve/CVE-2017-5396
https://access.redhat.com/security/updates/classification/#important
https://www.mozilla.org/en-US/security/advisories/mfsa2017-03/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFYksbBXlSAg2UNWIIRAmE/AJ9v2GkhbI7z8KNm4DsEjP8Qhjn8/wCfQrsj
udSzVHVv4uPEHHnQzABhJOE=
=E0xe
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC