{"id":"USN-2189-1","summary":"thunderbird vulnerabilities","details":"Bobby Holley, Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij,\nJesse Ruderman, Nathan Froyd and Christian Holler discovered multiple\nmemory safety issues in Thunderbird. If a user were tricked in to opening\na specially crafted message with scripting enabled, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2014-1518)\n\nAbhishek Arya discovered an out of bounds read when decoding JPG images.\nAn attacker could potentially exploit this to cause a denial of service\nvia application crash. (CVE-2014-1523)\n\nAbhishek Arya discovered a buffer overflow when a script uses a non-XBL\nobject as an XBL object. If a user had enabled scripting, an attacker\ncould potentially exploit this to execute arbitrary code with the\nprivileges of the user invoking Thunderbird. (CVE-2014-1524)\n\nMariusz Mlynski discovered that sites with notification permissions can\nrun script in a privileged context in some circumstances. If a user had\nenabled scripting, an attacker could exploit this to execute arbitrary\ncode with the privileges of the user invoking Thunderbird. (CVE-2014-1529)\n\nIt was discovered that browser history navigations could be used to load\na site with the addressbar displaying the wrong address. If a user had\nenabled scripting, an attacker could potentially exploit this to conduct\ncross-site scripting or phishing attacks. (CVE-2014-1530)\n\nA use-after-free was discovered when resizing images in some\ncircumstances. If a user had enabled scripting, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash or execute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2014-1531)\n\nTyson Smith and Jesse Schwartzentruber discovered a use-after-free during\nhost resolution in some circumstances. An attacker could potentially\nexploit this to cause a denial of service via application crash or execute\narbitrary code with the privileges of the user invoking Thunderbird.\n(CVE-2014-1532)\n","modified":"2026-02-10T04:40:48Z","published":"2014-04-30T22:18:45Z","related":["UBUNTU-CVE-2014-1518","UBUNTU-CVE-2014-1523","UBUNTU-CVE-2014-1524","UBUNTU-CVE-2014-1529","UBUNTU-CVE-2014-1530","UBUNTU-CVE-2014-1531","UBUNTU-CVE-2014-1532"],"upstream":["CVE-2014-1518","CVE-2014-1523","CVE-2014-1524","CVE-2014-1529","CVE-2014-1530","CVE-2014-1531","CVE-2014-1532","UBUNTU-CVE-2014-1518","UBUNTU-CVE-2014-1523","UBUNTU-CVE-2014-1524","UBUNTU-CVE-2014-1529","UBUNTU-CVE-2014-1530","UBUNTU-CVE-2014-1531","UBUNTU-CVE-2014-1532"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2189-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1518"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1523"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1524"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1529"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1530"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1531"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1532"},{"type":"REPORT","url":"https://launchpad.net/bugs/1313886"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:24.5.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.5.0+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-dev"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:24.5.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-lightning"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2189-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2014-1518","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1523","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1524","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1529","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1530","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1531","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1532","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}