Mozilla Thunderbird < 68.4.1

medium Nessus Plugin ID 132774
新推出!弱點優先順序評分 (VPR)

Tenable 會為每個弱點計算動態 VPR。VPR 將弱點資訊與威脅情報和機器學習演算法加以結合,藉此預測攻擊者最有可能利用哪些弱點發動攻擊。查看詳細資訊: VPR 是什麼?它跟 CVSS 有何不同?

VPR 評分: 8.4

Synopsis

遠端 Windows 主機上安裝的郵件用戶端受到多個弱點影響。

描述

遠端 Windows 主機上安裝的 Thunderbird 版本比 68.4.1 舊。因此會受到 mfsa2020-04 公告中所提及的多個弱點影響。- 可在新的內容處理程序初始化期間操控指標位移,進而導致記憶體損毀,以及父處理程序可能遭到惡意利用而損毀。*注意:此問題只會發生在 Windows 上。其他作業系統不受影響。* 此弱點會影響 Thunderbird < 68.4。(CVE-2019-17015) - 在貼上 <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17016) - Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17017) - During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17021) - When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17022) Mozilla developers Jason Kratzer, Christian Holler, and Bob Clary reported memory safety bugs present in Thunderbird 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2019-17024) - Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. (CVE-2019-17026) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

解決方案

升級至 Mozilla Thunderbird 68.4.1 版或更新版本。

另請參閱

https://www.mozilla.org/en-US/security/advisories/mfsa2020-04/

Plugin 詳細資訊

嚴重性: Medium

ID: 132774

檔案名稱: mozilla_thunderbird_68_4_1.nasl

版本: 1.3

類型: local

代理程式: windows

系列: Windows

已發布: 2020/1/10

已更新: 2020/1/16

相依性: mozilla_org_installed.nasl

風險資訊

風險因素: Medium

VPR 評分: 8.4

CVSS 評分資料來源: CVE-2019-17024

CVSS v2.0

基本分數: 6.8

時間分數: 5

媒介: AV:N/AC:M/Au:N/C:P/I:P/A:P

時間媒介: E:U/RL:OF/RC:C

CVSS v3.0

基本分數: 8.8

時間分數: 7.7

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

時間媒介: E:U/RL:O/RC:C

弱點資訊

CPE: cpe:/a:mozilla:thunderbird

必要的 KB 項目: Mozilla/Thunderbird/Version

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2020/1/10

弱點發布日期: 2020/1/8

參考資訊

CVE: CVE-2019-17015, CVE-2019-17016, CVE-2019-17017, CVE-2019-17021, CVE-2019-17022, CVE-2019-17024, CVE-2019-17026

MFSA: 2020-04