========================================================================== Ubuntu Security Notice USN-2859-1 January 13, 2016 thunderbird vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in Thunderbird. Software Description: - thunderbird: Mozilla Open Source mail and newsgroup client Details: Andrei Vaida, Jesse Ruderman, Bob Clary, and Jesse Ruderman discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7201) Ronald Crane discovered a buffer overflow through code inspection. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7205) Abhishek Arya discovered an integer overflow when allocating large textures. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7212) Ronald Crane dicovered an integer overflow when processing MP4 format video in some circumstances. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7213) Tsubasa Iinuma discovered a way to bypass same-origin restrictions using data: and view-source: URLs. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to obtain sensitive information and read local files. (CVE-2015-7214) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: thunderbird 1:38.5.1+build2-0ubuntu0.15.10.1 Ubuntu 15.04: thunderbird 1:38.5.1+build2-0ubuntu0.15.04.1 Ubuntu 14.04 LTS: thunderbird 1:38.5.1+build2-0ubuntu0.14.04.1 Ubuntu 12.04 LTS: thunderbird 1:38.5.1+build2-0ubuntu0.12.04.1 After a standard system update you need to restart Thunderbird to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2859-1 CVE-2015-7201, CVE-2015-7205, CVE-2015-7212, CVE-2015-7213, CVE-2015-7214 Package Information: https://launchpad.net/ubuntu/+source/thunderbird/1:38.5.1+build2-0ubuntu0.15.10.1 https://launchpad.net/ubuntu/+source/thunderbird/1:38.5.1+build2-0ubuntu0.15.04.1 https://launchpad.net/ubuntu/+source/thunderbird/1:38.5.1+build2-0ubuntu0.14.04.1 https://launchpad.net/ubuntu/+source/thunderbird/1:38.5.1+build2-0ubuntu0.12.04.1