Debian dla-3720:thunderbird - 安全性更新

high Nessus Plugin ID 189518

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 10 主機上安裝的多個套件受到 dla-3720 公告中提及的多個弱點影響。

- ANGLE 中的超出邊界寫入可能會允許攻擊者損毀記憶體,進而導致可能遭到惡意利用的當機。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。
(CVE-2024-0741)

- 由於頁面載入後使用錯誤時間戳記來阻止輸入,可能導致使用者意外啟用或關閉特定瀏覽器提示和對話方塊。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0742)

- 開啟列印預覽對話方塊的 Linux 使用者可造成瀏覽器損毀。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0746)

- 當父項頁面在具有「unsafe-inline」的 iframe 中載入子項時,父項內容安全性原則可覆寫子項內容安全性原則。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0747)

- 網路釣魚網站可能會改變「about: 」對話方塊的用途,在位址列中顯示來源不正確的網路釣魚內容。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0749)

- 快顯通知延遲計算中存在錯誤,攻擊者可利用此錯誤誘騙使用者授予權限。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0750)

- 惡意的 devtools 延伸模組可用來提升權限。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0751)

- 在特定 HSTS 設定中,攻擊者可繞過子網域上的 HSTS。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0753)

- Firefox 121、Firefox ESR 115.6 和 Thunderbird 115.6 中存在記憶體安全錯誤。某些錯誤顯示記憶體會遭到損毀,我們推測若有心人士有意操控,可能惡意利用其中部分錯誤執行任意程式碼。此弱點會影響 Firefox < 122、Firefox ESR < 115.7 和 Thunderbird < 115.7。(CVE-2024-0755)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 thunderbird 套件。

另請參閱

https://security-tracker.debian.org/tracker/source-package/thunderbird

https://security-tracker.debian.org/tracker/CVE-2024-0741

https://security-tracker.debian.org/tracker/CVE-2024-0742

https://security-tracker.debian.org/tracker/CVE-2024-0746

https://security-tracker.debian.org/tracker/CVE-2024-0747

https://security-tracker.debian.org/tracker/CVE-2024-0749

https://security-tracker.debian.org/tracker/CVE-2024-0750

https://security-tracker.debian.org/tracker/CVE-2024-0751

https://security-tracker.debian.org/tracker/CVE-2024-0753

https://security-tracker.debian.org/tracker/CVE-2024-0755

https://packages.debian.org/source/buster/thunderbird

Plugin 詳細資訊

嚴重性: High

ID: 189518

檔案名稱: debian_DLA-3720.nasl

版本: 1.1

類型: local

代理程式: unix

已發布: 2024/1/25

已更新: 2024/1/30

支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Critical

基本分數: 10

時間分數: 7.4

媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2024-0755

CVSS v3

風險因素: High

基本分數: 8.8

時間分數: 7.7

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:thunderbird, p-cpe:/a:debian:debian_linux:thunderbird-l10n-af, p-cpe:/a:debian:debian_linux:thunderbird-l10n-all, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ast, p-cpe:/a:debian:debian_linux:thunderbird-l10n-be, p-cpe:/a:debian:debian_linux:thunderbird-l10n-bg, p-cpe:/a:debian:debian_linux:thunderbird-l10n-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cak, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cs, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cy, p-cpe:/a:debian:debian_linux:thunderbird-l10n-da, p-cpe:/a:debian:debian_linux:thunderbird-l10n-de, p-cpe:/a:debian:debian_linux:thunderbird-l10n-dsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-el, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-gb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-es, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-mx, p-cpe:/a:debian:debian_linux:thunderbird-l10n-et, p-cpe:/a:debian:debian_linux:thunderbird-l10n-eu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fy-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ga-ie, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gd, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-he, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hy-am, p-cpe:/a:debian:debian_linux:thunderbird-l10n-id, p-cpe:/a:debian:debian_linux:thunderbird-l10n-is, p-cpe:/a:debian:debian_linux:thunderbird-l10n-it, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ja, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ka, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kab, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ko, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lv, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ms, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nb-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nn-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pa-in, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-pt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-rm, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ro, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ru, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sq, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sv-se, p-cpe:/a:debian:debian_linux:thunderbird-l10n-th, p-cpe:/a:debian:debian_linux:thunderbird-l10n-tr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uz, p-cpe:/a:debian:debian_linux:thunderbird-l10n-vi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-cn, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-tw, cpe:/o:debian:debian_linux:10.0

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2024/1/25

弱點發布日期: 2024/1/23

參考資訊

CVE: CVE-2024-0741, CVE-2024-0742, CVE-2024-0746, CVE-2024-0747, CVE-2024-0749, CVE-2024-0750, CVE-2024-0751, CVE-2024-0753, CVE-2024-0755