Mozilla Thunderbird < 68.4.1

high Nessus Plugin ID 132774

概要

遠端 Windows 主機上安裝的郵件用戶端受到多個弱點影響。

說明

遠端 Windows 主機上安裝的 Thunderbird 版本比 68.4.1 舊。因此會受到 mfsa2020-04 公告中所提及的多個弱點影響。- 可在新的內容處理程序初始化期間操控指標位移,進而導致記憶體損毀,以及父處理程序可能遭到惡意利用而損毀。*注意:此問題只會發生在 Windows 上。其他作業系統不受影響。* 此弱點會影響 Thunderbird < 68.4。(CVE-2019-17015) - 在貼上 <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17016) - Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17017) - During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17021) - When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Thunderbird < 68.4. (CVE-2019-17022) Mozilla developers Jason Kratzer, Christian Holler, and Bob Clary reported memory safety bugs present in Thunderbird 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2019-17024) - Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. (CVE-2019-17026) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

解決方案

升級至 Mozilla Thunderbird 68.4.1 版或更新版本。

另請參閱

https://www.mozilla.org/en-US/security/advisories/mfsa2020-04/

Plugin 詳細資訊

嚴重性: High

ID: 132774

檔案名稱: mozilla_thunderbird_68_4_1.nasl

版本: 1.8

類型: local

代理程式: windows

系列: Windows

已發布: 2020/1/10

已更新: 2023/4/25

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: Critical

分數: 9.2

CVSS v2

風險因素: Medium

基本分數: 6.8

時間分數: 5.9

媒介: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS 評分資料來源: CVE-2019-17026

CVSS v3

風險因素: High

基本分數: 8.8

時間分數: 8.4

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:H/RL:O/RC:C

弱點資訊

CPE: cpe:/a:mozilla:thunderbird

必要的 KB 項目: Mozilla/Thunderbird/Version

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2020/1/10

弱點發布日期: 2020/1/8

CISA 已知遭惡意利用弱點到期日: 2022/5/3

參考資訊

CVE: CVE-2019-17015, CVE-2019-17016, CVE-2019-17017, CVE-2019-17021, CVE-2019-17022, CVE-2019-17024, CVE-2019-17026

MFSA: 2020-04