USN-6333-1: Thunderbird vulnerabilities

Publication date

4 September 2023

Overview

Several security issues were fixed in Thunderbird.


Packages

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

Junsung Lee discovered that Thunderbird did not properly validate the text
direction override unicode character in filenames. An attacker could
potentially exploits this issue by spoofing file extension while attaching
a file in emails. (CVE-2023-3417)

Max Vlasov discovered that Thunderbird Offscreen Canvas did not properly
track cross-origin tainting. An attacker could potentially exploit this
issue to access image data from another site in violation of same-origin
policy. (CVE-2023-4045)

Alexander Guryanov discovered that Thunderbird did not properly update the
value of a global variable in WASM JIT analysis in some circumstances. An
attacker could potentially exploit this issue to cause a denial of service.
(CVE-2023-4046)

Mark Brand discovered that Thunderbird did not properly validate the size
of an...

Junsung Lee discovered that Thunderbird did not properly validate the text
direction override unicode character in filenames. An attacker could
potentially exploits this issue by spoofing file extension while attaching
a file in emails. (CVE-2023-3417)

Max Vlasov discovered that Thunderbird Offscreen Canvas did not properly
track cross-origin tainting. An attacker could potentially exploit this
issue to access image data from another site in violation of same-origin
policy. (CVE-2023-4045)

Alexander Guryanov discovered that Thunderbird did not properly update the
value of a global variable in WASM JIT analysis in some circumstances. An
attacker could potentially exploit this issue to cause a denial of service.
(CVE-2023-4046)

Mark Brand discovered that Thunderbird did not properly validate the size
of an untrusted input stream. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2023-4050)

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-4047, CVE-2023-4048,
CVE-2023-4049, CVE-2023-4055, CVE-2023-4056)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
23.04 lunar thunderbird –  1:102.15.0+build1-0ubuntu0.23.04.1
22.04 jammy thunderbird –  1:102.15.0+build1-0ubuntu0.22.04.1
20.04 focal thunderbird –  1:102.15.0+build1-0ubuntu0.20.04.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›