CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2016-5250 Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-3112-1)

2016年11月3日 1231点热度 0人点赞 0条评论

漏洞类别:Ubuntu漏洞等级:

漏洞信息

It was discovered that URLs of resources loaded after a navigation start could be leaked to the following page via the Resource Timing API.

Multiple memory safety issues in Thunderbird.

A heap buffer overflow during text conversion with some unicode characters.

A bad cast when processing layout with input elements in some circumstances.

A use-after-free was discovered in web animations during restyling.

A use-after-free was discovered in accessibility.

A use-after-free was discovered in web animations when destroying a timeline.

A buffer overflow was discovered when encoding image frames to images in some circumstances.

A use-after-free when changing text direction.

A use-after-free when manipulating SVG content in some circumstances.

An issue was discovered with the preloaded Public Key Pinning (HPKP).

漏洞危害

If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to obtain sensitive information. (CVE-2016-5250)

If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5257)

If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5270)

If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5272)

If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5274)

If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5276)

If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5277)

If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5278)

If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5280)

If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5281)

If a man-in-the-middle (MITM) attacker was able to obtain a fraudulent certificate for a Mozilla site, they could exploit this by providing malicious addon updates. (CVE-2016-5284)

解决方案

Refer to Ubuntu advisory USN-3112-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3112-1: 14.04 (Kylin) on src (thunderbird)

USN-3112-1: 16.10 (Yakkety) on src (thunderbird)

USN-3112-1: 16.04 (Xenial) on src (thunderbird)

USN-3112-1: 12.04 (Precise) on src (thunderbird)

0day

标签: 暂无
最后更新:2016年11月4日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me