安全公告详情

NS-SA-2020-0003

2020-01-13 14:12:46

简介

critical: 389-ds-base/thunderbird security update

严重级别

critical

主题

An update for 389-ds-base/thunderbird is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

389-ds-base: 389 Directory Server is an LDAPv3 compliant server. The base package includes the LDAP server and command line utilities for server administration.
thunderbird: Mozilla Thunderbird is a standalone mail and newsgroup client.


Security Fix(es):
389-ds-base: A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.(CVE-2019-14824)
389-ds-base: bugfix
thunderbird: In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.(CVE-2019-15903)
thunderbird: A use-after-free flaw was found in Mozilla Firefox and Thunderbird. When following a value's prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. An attacker could use this flaw to execute code that was stored in the referenced memory or crash the system.(CVE-2019-11757)
thunderbird: A flaw was found in the 360 Total Security code in Firefox and Thunderbird. Memory corruption is possible in the accessibility engine that could lead to an exploit to run arbitrary code. This vulnerability could be exploited over a network connection and would affect confidentiality and integrity of information as well as availability of the system.(CVE-2019-11758)
thunderbird: A flaw was found in Mozilla's firefox and thunderbird where if two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This could cause an interaction between two different sites on two different windows running under the same application.(CVE-2019-11762)
thunderbird: A flaw was found in Mozilla Firefox and Thunderbird where null bytes were incorrectly parsed in HTML entities. This could lead to HTML comments being treated as code which could lead to XSS in a web application or HTML entities being masked from filters.(CVE-2019-11763)
thunderbird: Several memory safety bugs were discovered in Mozilla Firefox and Thunderbird. Memory corruption and arbitrary code execution are possible with these vulnerabilities. These bugs can be exploited over the network.(CVE-2019-11764)
thunderbird: A flaw was discovered in both Firefox and Thunderbird where 4 bytes of a HMAC output could be written past the end of a buffer stored on the memory stack. This could allow an attacker to execute arbitrary code or lead to a crash. This flaw can be exploited over the network.(CVE-2019-11759)
thunderbird: A flaw was discovered in Mozilla Firefox and Thunderbird where a fixed-stack buffer overflow could occur during WebRTC signalling. The vulnerability could lead to an exploitable crash or leak data.(CVE-2019-11760)
thunderbird: A vulnerability was found in Mozilla Firefox and Thunderbird. Privileged JSONView objects that have been cloned into content can be accessed using a form with a data URI. This flaw bypasses existing defense-in-depth mechanisms and can be exploited over the network.(CVE-2019-11761)
thunderbird: Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.(CVE-2019-17010)
thunderbird: Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.(CVE-2019-17011)
thunderbird: Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.(CVE-2019-17012)
thunderbird: When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.(CVE-2019-17008)
thunderbird: The plain text serializer used a fixed-size array for the number of

    elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.(CVE-2019-17005)
    thunderbird: bugfix


    Solution:
    For details on how to apply this update, which includes the changes described in this advisory, refer to:
    http://security.gd-linux.com/how_to_apply_patch.html
    Remember the build tag is 5.05.F8.

    影响组件

    • 389-ds-base
    • thunderbird

    影响产品

    • CGSL MAIN 5.05
    • CGSL CORE 5.05

    更新包

    {"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["389-ds-base-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-libs-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-tests-1.3.9.1-12.el7_7.noarch.rpm"],"source":"389-ds-base-1.3.9.1-12.el7_7.src.rpm"},{"binary":["thunderbird-68.3.0-1.el7.centos.x86_64.rpm","thunderbird-debuginfo-68.3.0-1.el7.centos.x86_64.rpm"],"source":"thunderbird-68.3.0-1.el7.centos.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["389-ds-base-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-debuginfo-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-libs-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm","389-ds-base-tests-1.3.9.1-12.el7_7.noarch.rpm"],"source":"389-ds-base-1.3.9.1-12.el7_7.src.rpm"},{"binary":["thunderbird-68.3.0-1.el7.centos.x86_64.rpm","thunderbird-debuginfo-68.3.0-1.el7.centos.x86_64.rpm"],"source":"thunderbird-68.3.0-1.el7.centos.src.rpm"}]}]}

    CVE

    参考