Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.6515.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6515-1)
Summary:The remote host is missing an update for the 'thunderbird' package(s) announced via the USN-6515-1 advisory.
Description:Summary:
The remote host is missing an update for the 'thunderbird' package(s) announced via the USN-6515-1 advisory.

Vulnerability Insight:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-6206, CVE-2023-6212)

It was discovered that Thudnerbird did not properly manage memory when
images were created on the canvas element. An attacker could potentially
exploit this issue to obtain sensitive information. (CVE-2023-6204)

It discovered that Thunderbird incorrectly handled certain memory when
using a MessagePort. An attacker could potentially exploit this issue to
cause a denial of service. (CVE-2023-6205)

It discovered that Thunderbird incorrectly did not properly manage ownership
in ReadableByteStreams. An attacker could potentially exploit this issue
to cause a denial of service. (CVE-2023-6207)

It discovered that Thudnerbird incorrectly did not properly manage copy
operations when using Selection API in X11. An attacker could potentially
exploit this issue to obtain sensitive information. (CVE-2023-6208)

Rachmat Abdul Rokhim discovered that Thunderbird incorrectly handled
parsing of relative URLS starting with '///'. An attacker could potentially
exploit this issue to cause a denial of service. (CVE-2023-6209)

Affected Software/OS:
'thunderbird' package(s) on Ubuntu 20.04, Ubuntu 22.04, Ubuntu 23.04, Ubuntu 23.10.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-6204
Debian Security Information: DSA-5561 (Google Search)
https://www.debian.org/security/2023/dsa-5561
https://bugzilla.mozilla.org/show_bug.cgi?id=1841050
https://www.mozilla.org/security/advisories/mfsa2023-49/
https://www.mozilla.org/security/advisories/mfsa2023-50/
https://www.mozilla.org/security/advisories/mfsa2023-52/
https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html
https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-6205
https://bugzilla.mozilla.org/show_bug.cgi?id=1854076
Common Vulnerability Exposure (CVE) ID: CVE-2023-6206
https://bugzilla.mozilla.org/show_bug.cgi?id=1857430
Common Vulnerability Exposure (CVE) ID: CVE-2023-6207
https://bugzilla.mozilla.org/show_bug.cgi?id=1861344
Common Vulnerability Exposure (CVE) ID: CVE-2023-6208
https://bugzilla.mozilla.org/show_bug.cgi?id=1855345
Common Vulnerability Exposure (CVE) ID: CVE-2023-6209
https://bugzilla.mozilla.org/show_bug.cgi?id=1858570
Common Vulnerability Exposure (CVE) ID: CVE-2023-6212
Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.