{"id":"USN-2330-1","summary":"thunderbird vulnerabilities","details":"Jan de Mooij, Christian Holler, Karl Tomlinson, Randell Jesup, Gary Kwong,\nJesse Ruderman and JW Wang discovered multiple memory safety issues in\nThunderbird. If a user were tricked in to opening a specially crafted\nmessage with scripting enabled, an attacker could potentially exploit\nthese to cause a denial of service via application crash, or execute\narbitrary code with the privileges of the user invoking Thunderbird.\n(CVE-2014-1553, CVE-2014-1562)\n\nAbhishek Arya discovered a use-after-free during DOM interactions with\nSVG. If a user were tricked in to opening a specially crafted message\nwith scripting enabled, an attacker could potentially exploit this to\ncause a denial of service via application crash or execute arbitrary code\nwith the privileges of the user invoking Thunderbird. (CVE-2014-1563)\n\nMichal Zalewski discovered that memory is not initialized properly during\nGIF rendering in some circumstances. If a user were tricked in to opening\na specially crafted message, an attacker could potentially exploit this to\nsteal confidential information. (CVE-2014-1564)\n\nHolger Fuhrmannek discovered an out-of-bounds read in Web Audio. If a\nuser were tricked in to opening a specially crafted message with scripting\nenabled, an attacker could potentially exploit this to cause a denial of\nservice via application crash or steal confidential information.\n(CVE-2014-1565)\n\nA use-after-free was discovered during text layout in some circumstances.\nIf a user were tricked in to opening a specially crafted message with\nscripting enabled, an attacker could potentially exploit this to cause a\ndenial of service via application crash or execute arbitrary code with\nthe privileges of the user invoking Thunderbird. (CVE-2014-1567)\n","modified":"2026-02-10T04:40:49Z","published":"2014-09-11T22:31:49Z","related":["UBUNTU-CVE-2014-1553","UBUNTU-CVE-2014-1562","UBUNTU-CVE-2014-1563","UBUNTU-CVE-2014-1564","UBUNTU-CVE-2014-1565","UBUNTU-CVE-2014-1567"],"upstream":["CVE-2014-1553","CVE-2014-1562","CVE-2014-1563","CVE-2014-1564","CVE-2014-1565","CVE-2014-1567","UBUNTU-CVE-2014-1553","UBUNTU-CVE-2014-1562","UBUNTU-CVE-2014-1563","UBUNTU-CVE-2014-1564","UBUNTU-CVE-2014-1565","UBUNTU-CVE-2014-1567"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2330-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1553"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1562"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1563"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1564"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1565"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-1567"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:31.1.1+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:31.1.1+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1","1:31.0+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"thunderbird","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-dev","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-globalmenu","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-testsuite","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:31.1.1+build1-0ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2330-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1553"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1562"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1563"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1564"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1565"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-1567"}]}}}],"schema_version":"1.7.3"}