Debian dla-3748:thunderbird - 安全性更新

high Nessus Plugin ID 191490

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 10 主機上安裝的多個套件受到 dla-3748 公告中提及的多個弱點影響。

- 在網路通道上儲存和重新存取資料時,緩衝區的長度可能會混淆,進而導致超出邊界記憶體讀取。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1546)

- 透過一系列 API 呼叫和重新導向,攻擊者控制的警示對話方塊可顯示在其他網站上 (顯示受害者網站的 URL)。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1547)

- 網站可使用下拉式選取輸入元素來遮蔽全螢幕通知。這可導致使用者混淆,也可能觸發偽造攻擊。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1548)

- 如果網站設定大型自訂游標,游標的某些部分可能就會與權限對話方塊重疊,可能導致使用者混淆和未預期的授予權限。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1549)

- 惡意網站可利用現有的全螢幕模式和 `requestPointerLock` 的組合,造成使用者的滑鼠意外重新定位,進而導致使用者混淆不清,以及不慎授予他們本不打算授予的權限。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1550)

- 在多部分 HTTP 回應中,未正確遵守 Set-Cookie 回應標頭。如果攻擊者可控制 Content-Type 回應標頭和部分回應內文,則可插入本應由瀏覽器遵守的 Set-Cookie 回應標頭。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1551)

- 不正確的程式碼產生可導致未預期的數值轉換和潛在的未定義行為。*注意:此問題只會影響 32 位元 ARM 系統。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1552)

- Firefox 122、Firefox ESR 115.7 和 Thunderbird 115.7 中存在記憶體安全錯誤。某些錯誤顯示記憶體會遭到損毀,我們推測若有心人士有意操控,可能惡意利用其中部分錯誤執行任意程式碼。此弱點會影響 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1553)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 thunderbird 套件。

另請參閱

https://security-tracker.debian.org/tracker/source-package/thunderbird

https://security-tracker.debian.org/tracker/CVE-2024-1546

https://security-tracker.debian.org/tracker/CVE-2024-1547

https://security-tracker.debian.org/tracker/CVE-2024-1548

https://security-tracker.debian.org/tracker/CVE-2024-1549

https://security-tracker.debian.org/tracker/CVE-2024-1550

https://security-tracker.debian.org/tracker/CVE-2024-1551

https://security-tracker.debian.org/tracker/CVE-2024-1552

https://security-tracker.debian.org/tracker/CVE-2024-1553

https://packages.debian.org/source/buster/thunderbird

Plugin 詳細資訊

嚴重性: High

ID: 191490

檔案名稱: debian_DLA-3748.nasl

版本: 1.1

類型: local

代理程式: unix

已發布: 2024/3/4

已更新: 2024/3/21

支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: Medium

分數: 5.9

CVSS v2

風險因素: High

基本分數: 7.6

時間分數: 5.6

媒介: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2024-1553

CVSS v3

風險因素: High

基本分數: 7.5

時間分數: 6.5

媒介: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:thunderbird, p-cpe:/a:debian:debian_linux:thunderbird-l10n-af, p-cpe:/a:debian:debian_linux:thunderbird-l10n-all, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ast, p-cpe:/a:debian:debian_linux:thunderbird-l10n-be, p-cpe:/a:debian:debian_linux:thunderbird-l10n-bg, p-cpe:/a:debian:debian_linux:thunderbird-l10n-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cak, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cs, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cy, p-cpe:/a:debian:debian_linux:thunderbird-l10n-da, p-cpe:/a:debian:debian_linux:thunderbird-l10n-de, p-cpe:/a:debian:debian_linux:thunderbird-l10n-dsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-el, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-gb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-es, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-mx, p-cpe:/a:debian:debian_linux:thunderbird-l10n-et, p-cpe:/a:debian:debian_linux:thunderbird-l10n-eu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fy-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ga-ie, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gd, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-he, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hy-am, p-cpe:/a:debian:debian_linux:thunderbird-l10n-id, p-cpe:/a:debian:debian_linux:thunderbird-l10n-is, p-cpe:/a:debian:debian_linux:thunderbird-l10n-it, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ja, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ka, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kab, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ko, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lv, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ms, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nb-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nn-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pa-in, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-pt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-rm, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ro, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ru, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sq, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sv-se, p-cpe:/a:debian:debian_linux:thunderbird-l10n-th, p-cpe:/a:debian:debian_linux:thunderbird-l10n-tr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uz, p-cpe:/a:debian:debian_linux:thunderbird-l10n-vi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-cn, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-tw, cpe:/o:debian:debian_linux:10.0

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2024/3/4

弱點發布日期: 2024/2/20

參考資訊

CVE: CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553

IAVA: 2024-A-0108-S