{"id":"MGASA-2017-0039","summary":"Updated thunderbird packages fix security vulnerabilities","details":"JIT code allocation can allow for a bypass of ASLR and DEP protections\nleading to potential memory corruption attacks. (CVE-2017-5375)\n\nUse-after-free while manipulating XSL in XSLT documents. (CVE-2017-5376)\n\nHashed codes of JavaScript objects are shared between pages. This allows\nfor pointer leaks because an object’s address can be discovered through\nhash codes, and also allows for data leakage of an object’s content\nusing these hash codes. (CVE-2017-5378)\n\nA potential use-after-free found through fuzzing during DOM manipulation\nof SVG content. (CVE-2017-5380)\n\nThe JSON viewer in the Developer Tools uses insecure methods to create a\ncommunication channel for copying and viewing JSON or HTTP headers data,\nallowing for potential privilege escalation. (CVE-2017-5390)\n\nA use-after-free vulnerability in the Media Decoder when working with\nmedia files when some events are fired after the media elements are\nfreed from memory. (CVE-2017-5396)\n\nURLs containing certain unicode glyphs for alternative hyphens and\nquotes do not properly trigger punycode display, allowing for domain\nname spoofing attacks in the location bar. (CVE-2017-5383)\n\nMozilla developers and community members Christian Holler, Gary Kwong,\nAndré Bargull, Jan de Mooij, Tom Schuster, and Oriol reported memory\nsafety bugs present in Thunderbird 45.6. Some of these bugs showed\nevidence of memory corruption and we presume that with enough effort\nthat some of these could be exploited to run arbitrary code.\n(CVE-2017-5373)\n","modified":"2026-02-04T04:24:49.902638Z","published":"2017-02-03T21:39:38Z","related":["CVE-2017-5373","CVE-2017-5375","CVE-2017-5376","CVE-2017-5378","CVE-2017-5380","CVE-2017-5383","CVE-2017-5390","CVE-2017-5396"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0039.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20184"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/thunderbird/45.7.0/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2017-03/"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"45.7.0-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0039.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"45.7.0-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0039.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}