SB2023020602 - Ubuntu update for thunderbird
Published: February 6, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 29 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2022-45403)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error in Service Workers. A remote attacker can obtain information about the presence or length of a media file using timing information for cross-origin media combined with Range requests.
2) Spoofing attack (CVE-ID: CVE-2022-45404)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of a series of popup and window.print() calls. A remote attacker can force the browser to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks.
3) Use-after-free (CVE-ID: CVE-2022-45405)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the InputStream implementation. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
4) Use-after-free (CVE-ID: CVE-2022-45406)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when handling JavaScript realms. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
5) Spoofing attack (CVE-ID: CVE-2022-45408)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of a series of popups that reuse windowName. A remote attacker can force the browser to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks.
6) Use-after-free (CVE-ID: CVE-2022-45409)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Garbage Collection. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
7) Security features bypass (CVE-ID: CVE-2022-45410)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error when handling ServiceWorker-intercepted requests. When a ServiceWorker intercepted a request with FetchEvent, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections.
8) Cross-site tracing (CVE-ID: CVE-2022-45411)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error when handling non-standard headers. Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on fetch() and XMLHttpRequest; however some webservers have implemented non-standard headers such as X-Http-Method-Override
that override the HTTP method, and made this attack possible again.
9) Out-of-bounds read (CVE-ID: CVE-2022-45412)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when resolving a symlink such as file:///proc/self/fd/1. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger out-of-bounds read error and read contents of unitialized memory via an error message.
Note, this vulnerability does not affect Windows installations.
10) Information disclosure (CVE-ID: CVE-2022-45414)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the way quoted certain HTML tags are handled within the email client. If a Thunderbird user quoted from an HTML email, for example by replying
to the email, and the email contained either a VIDEO tag with the
POSTER attribute or an OBJECT tag with a DATA attribute, a network
request to the referenced remote URL was performed, regardless of a
configuration to block remote content. An image loaded from the POSTER
attribute was shown in the composer window. A remote attacker trick the victim into replying to a specially crafted email and force Thunderbird to initiate requests, potentially revealing sensitive information, such as IP address of the victim.
11) Security features bypass (CVE-ID: CVE-2022-45416)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to keystroke side-channel leakage. Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed.
12) Spoofing attack (CVE-ID: CVE-2022-45418)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of custom mouse cursor. A remote attacker can draw a custom mouse cursor, specified in CSS, over the browser UI, resulting in potential user confusion or spoofing attacks.
13) Spoofing attack (CVE-ID: CVE-2022-45420)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of tables inside of an iframe. A remote attacker can cause iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks.
14) Buffer overflow (CVE-ID: CVE-2022-45421)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
15) Buffer overflow (CVE-ID: CVE-2022-46871)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in libusrsctp. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
16) Security features bypass (CVE-ID: CVE-2022-46872)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to unspecified error on Linux installations. A remote attacker who compromised content process can escaped the sandbox and read arbitrary files via clipboard-related IPC messages.
17) Input validation error (CVE-ID: CVE-2022-46874)
The vulnerability allows a remote attacker to perform a spoofing attack.
The vulnerability exists due to insufficient validation of long filenames during drag and drop actions, which causes filename truncation to a potentially malicious extension. A remote attacker can trick the victim to download a file with a long filename, which can be automatically truncated by the browser into an executable file.
18) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2022-46877)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to the way fullscreen notifications are displayed by the browser. A remote attacker can confuse browser to delay or suppress fullscreen notifications and perform spoofing attack.
19) Buffer overflow (CVE-ID: CVE-2022-46878)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
20) Use-after-free (CVE-ID: CVE-2022-46880)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in WebGL. A remote attacker can trick the victim to open a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
21) Buffer overflow (CVE-ID: CVE-2022-46881)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebGL. A remote attacker can trick the victim into opening a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
22) Use-after-free (CVE-ID: CVE-2022-46882)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in WebGL. A remote attacker can trick the victim to open a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
23) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2023-0430)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to application does not check certificate OCSP revocation status when verifying S/Mime signatures. A remote attacker can sign their emails with a revoked certificate and they will be displayed as having a valid signature.
24) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-23598)
The vulnerability allows a remote attacker to read arbitrary files on the system.
The vulnerability exists due to improperly imposed security restrictions with the Firefox GTK wrapper. A remote attacker can trick the victim to perform certain actions on the web page, such as drag objects and read arbitrary files on the system via a call to DataTransfer.setData.
25) OS Command Injection (CVE-ID: CVE-2023-23599)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation when copying a network request from the developer tools panel as a curl command in devtools on Windows. A remote attacker can trick the victim to copy and paste data from the network request into a console and execute arbitrary commands.
26) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-23601)
The vulnerability allows a remote attacker to perform spoofing attacks.
The vulnerability exists due to the way browser treats dragging of URL from the cross-origin iframe into the same tab. A remote attacker can perform spoofing attack.
27) Security features bypass (CVE-ID: CVE-2023-23602)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to incorrect processing of CSP. A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers.
28) Incorrect Regular Expression (CVE-ID: CVE-2023-23603)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to usage of an incorrect regular expression when filtering out forbidden properties and values from style directives in calls to console.log. A remote attacker can exfiltrate data from the victim's browser.
29) Buffer overflow (CVE-ID: CVE-2023-23605)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.