Ubuntu Security Notice 3927-1 - It was discovered that Thunderbird allowed PAC files to specify that requests to localhost are sent through the proxy to another server. If proxy auto-detection is enabled, an attacker could potentially exploit this to conduct attacks on local services and tools. Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, or execute arbitrary code. Various other issues were also addressed.
31f9c116262cfb79aaf7ecac00f1cfd19e6694e7443bd751ab7e498952c674a7
==========================================================================
Ubuntu Security Notice USN-3927-1
March 28, 2019
thunderbird vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
It was discovered that Thunderbird allowed PAC files to specify that
requests to localhost are sent through the proxy to another server. If
proxy auto-detection is enabled, an attacker could potentially exploit
this to conduct attacks on local services and tools. (CVE-2018-18506)
Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
or execute arbitrary code. (CVE-2019-9788, CVE-2019-9790, CVE-2019-9791,
CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813)
A mechanism was discovered that removes some bounds checking for string,
array, or typed array accesses if Spectre mitigations have been disabled.
If a user were tricked in to opening a specially crafted website in a
browsing context with Spectre mitigations disabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2019-9793)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
thunderbird 1:60.6.1+build2-0ubuntu0.18.10.1
Ubuntu 18.04 LTS:
thunderbird 1:60.6.1+build2-0ubuntu0.18.04.1
Ubuntu 16.04 LTS:
thunderbird 1:60.6.1+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
thunderbird 1:60.6.1+build2-0ubuntu0.14.04.1
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3927-1
CVE-2018-18506, CVE-2019-9788, CVE-2019-9790, CVE-2019-9791,
CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796,
CVE-2019-9810, CVE-2019-9813
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.14.04.1