SB2021080217 - Red Hat Enterprise Linux 8.2 update for thunderbird
Published: August 2, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Command Injection (CVE-ID: CVE-2021-29969)
The vulnerability allows a remote attacker to execute arbitrary commands.
The vulnerability exists in the way Thunderbird handles IMAP server responses sent prior to STARTTLS process. A remote attacker with ability to perform MitM attack can send arbitrary IMAP commands before the STARTTLS handshake and execute them after the handshake is complete.
This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server.
2) Use-after-free (CVE-ID: CVE-2021-29970)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in accessibility features when processing HTML content. A remote attacker can track the victim to open a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Buffer overflow (CVE-ID: CVE-2021-29976)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Out-of-bounds write (CVE-ID: CVE-2021-30547)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted HTML content in ANGLE. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.