Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.845215
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5246-1)
Summary:The remote host is missing an update for the 'thunderbird' package(s) announced via the USN-5246-1 advisory.
Description:Summary:
The remote host is missing an update for the 'thunderbird' package(s) announced via the USN-5246-1 advisory.

Vulnerability Insight:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, conduct spoofing attacks, bypass security
restrictions, or execute arbitrary code. (CVE-2021-4129, CVE-2021-4140,
CVE-2021-43536, CVE-2021-43537, CVE-2021-43538, CVE-2021-43539,
CVE-2021-43541, CVE-2021-43542, CVE-2021-43543, CVE-2021-43545,
CVE-2021-43656, CVE-2022-22737, CVE-2022-22738, CVE-2022-22739,
CVE-2022-22740, CVE-2022-22741, CVE-2022-22742, CVE-2022-22743,
CVE-2022-22745, CVE-2022-22747, CVE-2022-22748, CVE-2022-22751)

It was discovered that JavaScript was unexpectedly enabled in the
composition area. An attacker could potentially exploit this in
combination with another vulnerability, with unspecified impacts.
(CVE-2021-43528)

A buffer overflow was discovered in the Matrix chat library bundled with
Thunderbird. An attacker could potentially exploit this to cause a denial
of service, or execute arbitrary code. (CVE-2021-44538)

It was discovered that Thunderbird's OpenPGP integration only considered
the inner signed message when checking signature validity in a message
that contains an additional outer MIME layer. An attacker could
potentially exploit this to trick the user into thinking that a message
has a valid signature. (CVE-2021-4126)

Affected Software/OS:
'thunderbird' package(s) on Ubuntu 21.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-4126
https://bugzilla.mozilla.org/show_bug.cgi?id=1732310
https://www.mozilla.org/security/advisories/mfsa2021-55/
Common Vulnerability Exposure (CVE) ID: CVE-2021-4129
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1393362%2C1736046%2C1736751%2C1737009%2C1739372%2C1739421
https://www.mozilla.org/security/advisories/mfsa2021-52/
https://www.mozilla.org/security/advisories/mfsa2021-53/
https://www.mozilla.org/security/advisories/mfsa2021-54/
Common Vulnerability Exposure (CVE) ID: CVE-2021-4140
https://bugzilla.mozilla.org/show_bug.cgi?id=1746720
https://www.mozilla.org/security/advisories/mfsa2022-01/
https://www.mozilla.org/security/advisories/mfsa2022-02/
https://www.mozilla.org/security/advisories/mfsa2022-03/
Common Vulnerability Exposure (CVE) ID: CVE-2021-43528
Debian Security Information: DSA-5034 (Google Search)
https://www.debian.org/security/2022/dsa-5034
https://security.gentoo.org/glsa/202208-14
https://bugzilla.mozilla.org/show_bug.cgi?id=1742579
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-43536
Debian Security Information: DSA-5026 (Google Search)
https://www.debian.org/security/2021/dsa-5026
https://security.gentoo.org/glsa/202202-03
https://bugzilla.mozilla.org/show_bug.cgi?id=1730120
https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-43537
https://bugzilla.mozilla.org/show_bug.cgi?id=1738237
Common Vulnerability Exposure (CVE) ID: CVE-2021-43538
https://bugzilla.mozilla.org/show_bug.cgi?id=1739091
Common Vulnerability Exposure (CVE) ID: CVE-2021-43539
https://bugzilla.mozilla.org/show_bug.cgi?id=1739683
Common Vulnerability Exposure (CVE) ID: CVE-2021-43541
https://bugzilla.mozilla.org/show_bug.cgi?id=1696685
Common Vulnerability Exposure (CVE) ID: CVE-2021-43542
https://bugzilla.mozilla.org/show_bug.cgi?id=1723281
Common Vulnerability Exposure (CVE) ID: CVE-2021-43543
https://bugzilla.mozilla.org/show_bug.cgi?id=1738418
Common Vulnerability Exposure (CVE) ID: CVE-2021-43545
https://bugzilla.mozilla.org/show_bug.cgi?id=1720926
Common Vulnerability Exposure (CVE) ID: CVE-2021-43546
https://bugzilla.mozilla.org/show_bug.cgi?id=1737751
Common Vulnerability Exposure (CVE) ID: CVE-2021-44538
https://gitlab.matrix.org/matrix-org/olm/-/tags
https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk
Common Vulnerability Exposure (CVE) ID: CVE-2022-22737
https://bugzilla.mozilla.org/show_bug.cgi?id=1745874
Common Vulnerability Exposure (CVE) ID: CVE-2022-22738
https://bugzilla.mozilla.org/show_bug.cgi?id=1742382
Common Vulnerability Exposure (CVE) ID: CVE-2022-22739
https://bugzilla.mozilla.org/show_bug.cgi?id=1744158
Common Vulnerability Exposure (CVE) ID: CVE-2022-22740
https://bugzilla.mozilla.org/show_bug.cgi?id=1742334
Common Vulnerability Exposure (CVE) ID: CVE-2022-22741
https://bugzilla.mozilla.org/show_bug.cgi?id=1740389
Common Vulnerability Exposure (CVE) ID: CVE-2022-22742
https://bugzilla.mozilla.org/show_bug.cgi?id=1739923
Common Vulnerability Exposure (CVE) ID: CVE-2022-22743
https://bugzilla.mozilla.org/show_bug.cgi?id=1739220
Common Vulnerability Exposure (CVE) ID: CVE-2022-22745
https://bugzilla.mozilla.org/show_bug.cgi?id=1735856
Common Vulnerability Exposure (CVE) ID: CVE-2022-22747
https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
Common Vulnerability Exposure (CVE) ID: CVE-2022-22748
https://bugzilla.mozilla.org/show_bug.cgi?id=1705211
Common Vulnerability Exposure (CVE) ID: CVE-2022-22751
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.