[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2019-1304 --- thunderbird

ID: oval:org.secpod.oval:def:1700219Date: (C)2019-10-07   (M)2024-04-17
Class: PATCHFamily: unix




Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird lt; 68.1 and Thunderbird lt; 60.9. A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a lt;canvasgt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox lt; 69, Thunderbird lt; 68.1, Thunderbird lt; 60.9, Firefox ESR lt; 60.9, and Firefox ESR lt; 68.1. A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox lt; 69, Thunderbird lt; 68.1, Thunderbird lt; 60.9, Firefox ESR lt; 60.9, and Firefox ESR lt; 68.1. It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox lt; 69, Thunderbird lt; 68.1, Thunderbird lt; 60.9, Firefox ESR lt; 60.9, and Firefox ESR lt; 68.1. Some HTML elements, such as lt;titlegt; and lt;textareagt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox lt; 69, Thunderbird lt; 68.1, Thunderbird lt; 60.9, Firefox ESR lt; 60.9, and Firefox ESR lt; 68.1. Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox lt; 69, Thunderbird lt; 68.1, Thunderbird lt; 60.9, Firefox ESR lt; 60.9, and Firefox ESR lt; 68.1. Navigation events were not fully adhering to the W3C#039;s quot;Navigation-Timing Level 2quot; draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox lt; 69, Thunderbird lt; 68.1, Thunderbird lt; 60.9, Firefox ESR lt; 60.9, and Firefox ESR lt; 68.1

Platform:
Amazon Linux 2
Product:
thunderbird
Reference:
ALAS2-2019-1304
CVE-2019-11752
CVE-2019-11740
CVE-2019-11743
CVE-2019-11742
CVE-2019-11744
CVE-2019-11739
CVE-2019-11746
CVE    7
CVE-2019-11739
CVE-2019-11740
CVE-2019-11743
CVE-2019-11744
...

© SecPod Technologies