{"id":"USN-2552-1","summary":"thunderbird vulnerabilities","details":"Olli Pettay and Boris Zbarsky discovered an issue during anchor\nnavigations in some circumstances. If a user were tricked in to opening\na specially crafted message with scripting enabled, an attacker could\npotentially exploit this to bypass same-origin policy restrictions.\n(CVE-2015-0801)\n\nChristoph Kerschbaumer discovered that CORS requests from\nnavigator.sendBeacon() followed 30x redirections after preflight. If a\nuser were tricked in to opening a specially crafted message with\nscripting enabled, an attacker could potentially exploit this to conduct\ncross-site request forgery (XSRF) attacks. (CVE-2015-0807)\n\nAki Helin discovered a use-after-free when playing MP3 audio files using\nthe Fluendo MP3 GStreamer plugin in certain circumstances. If a user were\ntricked in to opening a specially crafted message, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2015-0813)\n\nChristian Holler, Steve Fink, and Byron Campen discovered multiple memory\nsafety issues in Thunderbird. If a user were tricked in to opening a\nspecially crafted message with scripting enabled, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2015-0815)\n\nMariusz Mlynski discovered that documents loaded via resource: URLs (such\nas PDF.js) could load privileged chrome pages. If a user were tricked in\nto opening a specially crafted message with scripting enabled, an attacker\ncould potentially exploit this in combination with another flaw, in order\nto execute arbitrary script in a privileged context. (CVE-2015-0816)\n","modified":"2026-04-22T09:10:15.682573Z","published":"2015-04-02T15:47:27Z","related":["UBUNTU-CVE-2015-0801","UBUNTU-CVE-2015-0807","UBUNTU-CVE-2015-0813","UBUNTU-CVE-2015-0815","UBUNTU-CVE-2015-0816"],"upstream":["CVE-2015-0801","CVE-2015-0807","CVE-2015-0813","CVE-2015-0815","CVE-2015-0816","UBUNTU-CVE-2015-0801","UBUNTU-CVE-2015-0807","UBUNTU-CVE-2015-0813","UBUNTU-CVE-2015-0815","UBUNTU-CVE-2015-0816"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2552-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-0801"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-0807"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-0813"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-0815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-0816"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:31.6.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:31.6.0+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1","1:31.0+build1-0ubuntu0.14.04.1","1:31.1.1+build1-0ubuntu0.14.04.1","1:31.1.2+build1-0ubuntu0.14.04.1","1:31.2.0+build2-0ubuntu0.14.04.1","1:31.3.0+build1-0ubuntu0.14.04.1","1:31.4.0+build1-0ubuntu0.14.04.1","1:31.5.0+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird"},{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:31.6.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-0801"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-0807"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-0813"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-0815"},{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2015-0816"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2552-1.json"}}],"schema_version":"1.7.5"}