Debian dsa-5670:thunderbird - 安全性更新

high Nessus Plugin ID 193694

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 11/12 主機上安裝的多個套件受到 dsa-5670 公告中提及的多個弱點影響。

- 視窗未處於焦點時,權限提示輸入延遲可能會過期。這使其容易遭受惡意網站發動的點擊劫持攻擊。此弱點會影響 Firefox < 124、Firefox ESR < 115.10 和 Thunderbird < 115.10。(CVE-2024-2609)

- 可處理的 HTTP/2 CONTINUATION 框架數沒有限制。伺服器可濫用此弱點,在瀏覽器中造成記憶體不足情形。此弱點會影響 Firefox < 125、Firefox ESR < 115.10 和 Thunderbird < 115.10。(CVE-2024-3302)

- 當套用 JIT 最佳化時,GetBoundName 可能會傳回物件的錯誤版本。此弱點會影響 Firefox < 125、Firefox ESR < 115.10 和 Thunderbird < 115.10。(CVE-2024-3852)

- 在某些程式碼模式中,JIT 未正確最佳化交換器陳述式,並產生具有超出邊界讀取問題的程式碼。此弱點會影響 Firefox < 125、Firefox ESR < 115.10 和 Thunderbird < 115.10。
(CVE-2024-3854)

- 在某些情況下,JIT 會針對引數建立不正確的程式碼。這會導致在記憶體回收期間發生由釋放後使用造成的程式損毀。此弱點會影響 Firefox < 125、Firefox ESR < 115.10 和 Thunderbird < 115.10。(CVE-2024-3857)

- 在 32 位元版本中,存在會導致超出邊界讀取的整數溢位弱點,透過格式錯誤的 OpenType 字型可觸發此弱點。此弱點會影響 Firefox < 125、Firefox ESR < 115.10 和 Thunderbird < 115.10。(CVE-2024-3859)

- 如果將 AlignedBuffer 指派給本身,後續的自我移動可導致錯誤的參照計數,以及之後的釋放後使用問題。此弱點會影響 Firefox < 125、Firefox ESR < 115.10 和 Thunderbird < 115.10。(CVE-2024-3861)

- Firefox 124、Firefox ESR 115.9 和 Thunderbird 115.9 中存在記憶體安全錯誤。此錯誤顯示記憶體損毀跡象,我們推測若有心人士有意操控,可利用此錯誤來執行任意程式碼。此弱點會影響 Firefox < 125、Firefox ESR < 115.10 和 Thunderbird < 115.10。
(CVE-2024-3864)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 thunderbird 套件。

另請參閱

https://packages.debian.org/source/bookworm/thunderbird

https://packages.debian.org/source/bullseye/thunderbird

https://security-tracker.debian.org/tracker/source-package/thunderbird

https://security-tracker.debian.org/tracker/CVE-2024-2609

https://security-tracker.debian.org/tracker/CVE-2024-3302

https://security-tracker.debian.org/tracker/CVE-2024-3852

https://security-tracker.debian.org/tracker/CVE-2024-3854

https://security-tracker.debian.org/tracker/CVE-2024-3857

https://security-tracker.debian.org/tracker/CVE-2024-3859

https://security-tracker.debian.org/tracker/CVE-2024-3861

https://security-tracker.debian.org/tracker/CVE-2024-3864

Plugin 詳細資訊

嚴重性: High

ID: 193694

檔案名稱: debian_DSA-5670.nasl

版本: 1.4

類型: local

代理程式: unix

已發布: 2024/4/23

已更新: 2024/4/28

支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: High

基本分數: 7.6

時間分數: 5.6

媒介: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2024-3864

CVSS v3

風險因素: High

基本分數: 7.5

時間分數: 6.5

媒介: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: cpe:/o:debian:debian_linux:11.0, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:debian:debian_linux:thunderbird, p-cpe:/a:debian:debian_linux:thunderbird-l10n-af, p-cpe:/a:debian:debian_linux:thunderbird-l10n-all, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ast, p-cpe:/a:debian:debian_linux:thunderbird-l10n-be, p-cpe:/a:debian:debian_linux:thunderbird-l10n-bg, p-cpe:/a:debian:debian_linux:thunderbird-l10n-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cak, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cs, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cy, p-cpe:/a:debian:debian_linux:thunderbird-l10n-da, p-cpe:/a:debian:debian_linux:thunderbird-l10n-de, p-cpe:/a:debian:debian_linux:thunderbird-l10n-dsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-el, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-gb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-es, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-mx, p-cpe:/a:debian:debian_linux:thunderbird-l10n-et, p-cpe:/a:debian:debian_linux:thunderbird-l10n-eu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fy-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ga-ie, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gd, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-he, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hy-am, p-cpe:/a:debian:debian_linux:thunderbird-l10n-id, p-cpe:/a:debian:debian_linux:thunderbird-l10n-is, p-cpe:/a:debian:debian_linux:thunderbird-l10n-it, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ja, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ka, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kab, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ko, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lv, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ms, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nb-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nn-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pa-in, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-pt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-rm, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ro, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ru, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sq, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sv-se, p-cpe:/a:debian:debian_linux:thunderbird-l10n-th, p-cpe:/a:debian:debian_linux:thunderbird-l10n-tr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uz, p-cpe:/a:debian:debian_linux:thunderbird-l10n-vi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-cn, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-tw

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2024/4/22

弱點發布日期: 2024/3/19

參考資訊

CVE: CVE-2024-2609, CVE-2024-3302, CVE-2024-3852, CVE-2024-3854, CVE-2024-3857, CVE-2024-3859, CVE-2024-3861, CVE-2024-3864

IAVA: 2024-A-0174-S