{"id":"USN-2296-1","summary":"thunderbird vulnerabilities","details":"Christian Holler, David Keeler and Byron Campen discovered multiple memory\nsafety issues in Thunderbird. If a user were tricked in to opening a\nspecially crafted message with scripting enabled, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2014-1547)\n\nAtte Kettunen discovered a buffer overflow when interacting with WebAudio\nbuffers. If a user had enabled scripting, an attacker could potentially\nexploit this to cause a denial of service via application crash or execute\narbitrary code with the privileges of the user invoking Thunderbird.\n(CVE-2014-1549)\n\nAtte Kettunen discovered a use-after-free in WebAudio. If a user had\nenabled scripting, an attacker could potentially exploit this to cause a\ndenial of service via application crash or execute arbitrary code with the\nprivileges of the user invoking Thunderbird. (CVE-2014-1550)\n\nJethro Beekman discovered a use-after-free when the FireOnStateChange\nevent is triggered in some circumstances. If a user had enabled scripting,\nan attacker could potentially exploit this to cause a denial of service\nvia application crash or execute arbitrary code with the priviliges of\nthe user invoking Thunderbird. (CVE-2014-1555)\n\nPatrick Cozzi discovered a crash when using the Cesium JS library to\ngenerate WebGL content. If a user had enabled scripting, an attacker could\npotentially exploit this to execute arbitrary code with the privilges of\nthe user invoking Thunderbird. (CVE-2014-1556)\n\nTyson Smith and Jesse Schwartzentruber discovered a use-after-free in\nCERT_DestroyCertificate. If a user had enabled scripting, an attacker\ncould potentially exploit this to cause a denial of service via\napplication crash or execute arbitrary code with the privileges of the\nuser invoking Thunderbird. (CVE-2014-1544)\n\nA crash was discovered in Skia when scaling an image, if the scaling\noperation takes too long. If a user had enabled scripting, an attacker\ncould potentially exploit this to execute arbitrary code with the\nprivileges of the user invoking Thunderbird. (CVE-2014-1557)\n\nChristian Holler discovered several issues when parsing certificates\nwith non-standard character encoding, resulting in the inability to\nuse valid SSL certificates in some circumstances. (CVE-2014-1558,\nCVE-2014-1559, CVE-2014-1560)\n\nBoris Zbarsky discovered that network redirects could cause an iframe\nto escape the confinements defined by its sandbox attribute in some\ncircumstances. If a user had enabled scripting, an attacker could\npotentially exploit this to conduct cross-site scripting attacks.\n(CVE-2014-1552)\n","modified":"2026-02-10T04:40:49Z","published":"2014-07-22T21:08:37Z","related":["UBUNTU-CVE-2014-1544","UBUNTU-CVE-2014-1547","UBUNTU-CVE-2014-1549","UBUNTU-CVE-2014-1550","UBUNTU-CVE-2014-1552","UBUNTU-CVE-2014-1555","UBUNTU-CVE-2014-1556","UBUNTU-CVE-2014-1557","UBUNTU-CVE-2014-1558","UBUNTU-CVE-2014-1559","UBUNTU-CVE-2014-1560"],"upstream":["CVE-2014-1544","CVE-2014-1547","CVE-2014-1549","CVE-2014-1550","CVE-2014-1552","CVE-2014-1555","CVE-2014-1556","CVE-2014-1557","CVE-2014-1558","CVE-2014-1559","CVE-2014-1560","UBUNTU-CVE-2014-1544","UBUNTU-CVE-2014-1547","UBUNTU-CVE-2014-1549","UBUNTU-CVE-2014-1550","UBUNTU-CVE-2014-1552","UBUNTU-CVE-2014-1555","UBUNTU-CVE-2014-1556","UBUNTU-CVE-2014-1557","UBUNTU-CVE-2014-1558","UBUNTU-CVE-2014-1559","UBUNTU-CVE-2014-1560"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2296-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1544"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1547"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1549"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1550"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1552"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1555"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1556"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1557"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1558"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1559"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1560"},{"type":"REPORT","url":"https://launchpad.net/bugs/1346007"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:31.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:31.0+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"thunderbird","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-dev","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-globalmenu","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-testsuite","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:31.0+build1-0ubuntu0.14.04.1"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2014-1544","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1547","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1549","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1550","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1552","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1555","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1556","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1557","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2014-1558","severity":[{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2014-1559","severity":[{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2014-1560","severity":[{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2296-1.json"}}],"schema_version":"1.7.3"}