[USN-3897-1] Thunderbird vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”krI3QjbS9yyFADx5BqYnMI2H8VAZbn5Za”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–krI3QjbS9yyFADx5BqYnMI2H8VAZbn5Za

protected-headers=”v1″
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3897-1] Thunderbird vulnerabilities

–IM12T8MbKQzIwb274oaOHDwmmHjQEwkMv

Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

=
=

Ubuntu Security Notice USN-3897-1
February 26, 2019

thunderbird vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Thunderbird.

Software Description:
– thunderbird: Mozilla Open Source mail and newsgroup client

Details:

A use-after-free was discovered in libical. If a user were tricked in to
opening a specially crafted ICS calendar file, an attacker could
potentially exploit this to cause a denial of service. (CVE-2016-5824)

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted message, an attacker could
potentially exploit these to cause a denial of service, or execute
arbitrary code. (CVE-2018-18356, CVE-2018-18500, CVE-2019-5785)

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,=

gain additional privileges by escaping the sandbox, or execute arbitrary
code. (CVE-2018-18501, CVE-2018-18505)

An issue was discovered with S/MIME signature verification in some
circumstances. An attacker could potentially exploit this by spoofing
signatures for arbitrary content. (CVE-2018-18509)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
=C2=A0 thunderbird=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 1:60.5.1+=
build2-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
=C2=A0 thunderbird=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 1:60.5.1+=
build2-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
=C2=A0 thunderbird=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 1:60.5.1+=
build2-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
=C2=A0 thunderbird=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 1:60.5.1+=
build2-0ubuntu0.14.04.1

After a standard system update you need to restart Thunderbird to make
all the necessary changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3897-1
=C2=A0 CVE-2016-5824, CVE-2018-18356, CVE-2018-18500, CVE-2018-18501,
=C2=A0 CVE-2018-18505, CVE-2018-18509, CVE-2019-5785

Package Information:
=C2=A0
https://launchpad.net/ubuntu/+source/thunderbird/1:60.5.1+build2-0ubuntu0=
=2E18.10.1
=C2=A0
https://launchpad.net/ubuntu/+source/thunderbird/1:60.5.1+build2-0ubuntu0=
=2E18.04.1
=C2=A0
https://launchpad.net/ubuntu/+source/thunderbird/1:60.5.1+build2-0ubuntu0=
=2E16.04.1
=C2=A0
https://launchpad.net/ubuntu/+source/thunderbird/1:60.5.1+build2-0ubuntu0=
=2E14.04.1

–IM12T8MbKQzIwb274oaOHDwmmHjQEwkMv–

–krI3QjbS9yyFADx5BqYnMI2H8VAZbn5Za

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlx1jv0ACgkQYR+97NWU
bg/gEwgAqtI+m99Hc30PcwrnLqlq/6/QszK1TiF2qSc0p/LBqiKz6ZLmpmGuN1oT
sqEDF9zFGofSO5r32hLxmv2MwP+dzzARCUQQ8gUKZmX9ABbFt1qUr+MtIbbkHKc7
uKaHwi4RImClHLZPaM1eUec/TyBylHCXnX+JD9rVS8k8ywmwBrSe1xn4QeIZUSlO
rY48sF6ACAJPyXhHlLPypYy0XRqVAT1+b/VAcn7LkgBnN0qgb6Ycx6olAZ92ONeM
vEDd3uOBAIofQug+guzEudnT57WiG0xPaTefJntur4tXsHM8ZY2nnwaxJay74QiW
5GyPwbS2WeCyvAK4IDstLb/18aHJfg==
=rDSD
—–END PGP SIGNATURE—–

–krI3QjbS9yyFADx5BqYnMI2H8VAZbn5Za–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK