{"id":"USN-2250-1","summary":"thunderbird vulnerabilities","details":"Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de\nMooij, Ryan VanderMeulen, Jeff Walden and Kyle Huey discovered multiple\nmemory safety issues in Thunderbird. If a user were tricked in to opening\na specially crafted message with scripting enabled, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2014-1533)\n\nAbhishek Arya discovered multiple use-after-free and out-of-bounds read\nissues in Thunderbird. If a user had enabled scripting, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash or execute arbitrary code with the priviliges of the user invoking\nThunderbird. (CVE-2014-1538)\n\nA use-after-free was discovered in the SMIL animation controller. If a\nuser had enabled scripting, an attacker could potentially exploit this\nto cause a denial of service via application crash or execute arbitrary\ncode with the priviliges of the user invoking Thunderbird. (CVE-2014-1541)\n","modified":"2026-04-22T08:54:04.922315Z","published":"2014-06-19T11:22:36Z","related":["UBUNTU-CVE-2014-1533","UBUNTU-CVE-2014-1538","UBUNTU-CVE-2014-1541"],"upstream":["CVE-2014-1533","CVE-2014-1538","CVE-2014-1541","UBUNTU-CVE-2014-1533","UBUNTU-CVE-2014-1538","UBUNTU-CVE-2014-1541"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2250-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1533"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1538"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1541"},{"type":"REPORT","url":"https://launchpad.net/bugs/1328003"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:24.6.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.6.0+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird"},{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:24.6.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-lightning"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2250-1.json","cves_map":{"cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1533"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1538"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-1541"}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.5"}