Description: | Summary: The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2018-0203 advisory.
Vulnerability Insight: * A buffer overflow can occur when manipulating the SVG animatedPathSegList through script. This results in a potentially exploitable crash (CVE-2018-5127). * A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process (CVE-2018-5129). * An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter (CVE-2018-5144). * An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest (CVE-2018-5146). * Mozilla developers and community members reported memory safety bugs present in Firefox 58, Firefox ESR 52.6, and Thunderbird 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code (CVE-2018-5125). * Mozilla developers reported memory safety bugs present in Firefox ESR 52.6 and Thunderbird 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code (CVE-2018-5145).
Affected Software/OS: 'thunderbird, thunderbird-l10n' package(s) on Mageia 6.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|