Description: | Summary: The remote host is missing an update for the 'thunderbird' package(s) announced via the CESA-2019:3756 advisory.
Vulnerability Insight: Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 68.2.0.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)
* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)
* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)
* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)
* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)
* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)
* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)
* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software/OS: 'thunderbird' package(s) on CentOS 6.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
|