{"id":"USN-2754-1","summary":"thunderbird vulnerabilities","details":"Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David\nMajor, Andrew McCreight, and Cameron McCormack discovered multiple memory\nsafety issues in Thunderbird. If a user were tricked in to opening a\nspecially crafted message, an attacker could potentially exploit these to\ncause a denial of service via application crash, or execute arbitrary code\nwith the privileges of the user invoking Thunderbird. (CVE-2015-4500)\n\nKhalil Zhani discovered a buffer overflow when parsing VP9 content in some\ncircumstances. If a user were tricked in to opening a specially crafted\nmessage, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking Thunderbird. (CVE-2015-4506)\n\nA use-after-free was discovered when manipulating HTML media content in\nsome circumstances. If a user were tricked in to opening a specially\ncrafted website in a browsing context, an attacker could potentially\nexploit this to cause a denial of service via application crash, or\nexecute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2015-4509)\n\nAtte Kettunen discovered a buffer overflow in the nestegg library when\ndecoding WebM format video in some circumstances. If a user were tricked\nin to opening a specially crafted message, an attacker could potentially\nexploit this to cause a denial of service via application crash, or\nexecute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2015-4511)\n\nRonald Crane reported multiple vulnerabilities. If a user were tricked in\nto opening a specially crafted website in a browsing context, an attacker\ncould potentially exploit these to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Thunderbird. (CVE-2015-4517, CVE-2015-4521, CVE-2015-4522,\nCVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)\n\nMario Gomes discovered that dragging and dropping an image after a\nredirect exposes the redirected URL to scripts. An attacker could\npotentially exploit this to obtain sensitive information. (CVE-2015-4519)\n\nEhsan Akhgari discovered 2 issues with CORS preflight requests. An\nattacker could potentially exploit these to bypass CORS restrictions.\n(CVE-2015-4520)\n","modified":"2026-04-22T09:17:33.128329Z","published":"2015-10-05T14:30:07Z","related":["UBUNTU-CVE-2015-4500","UBUNTU-CVE-2015-4506","UBUNTU-CVE-2015-4509","UBUNTU-CVE-2015-4511","UBUNTU-CVE-2015-4517","UBUNTU-CVE-2015-4519","UBUNTU-CVE-2015-4520","UBUNTU-CVE-2015-4521","UBUNTU-CVE-2015-4522","UBUNTU-CVE-2015-7174","UBUNTU-CVE-2015-7175","UBUNTU-CVE-2015-7176","UBUNTU-CVE-2015-7177","UBUNTU-CVE-2015-7180"],"upstream":["CVE-2015-4500","CVE-2015-4506","CVE-2015-4509","CVE-2015-4511","CVE-2015-4517","CVE-2015-4519","CVE-2015-4520","CVE-2015-4521","CVE-2015-4522","CVE-2015-7174","CVE-2015-7175","CVE-2015-7176","CVE-2015-7177","CVE-2015-7180","UBUNTU-CVE-2015-4500","UBUNTU-CVE-2015-4506","UBUNTU-CVE-2015-4509","UBUNTU-CVE-2015-4511","UBUNTU-CVE-2015-4517","UBUNTU-CVE-2015-4519","UBUNTU-CVE-2015-4520","UBUNTU-CVE-2015-4521","UBUNTU-CVE-2015-4522","UBUNTU-CVE-2015-7174","UBUNTU-CVE-2015-7175","UBUNTU-CVE-2015-7176","UBUNTU-CVE-2015-7177","UBUNTU-CVE-2015-7180"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2754-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4500"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4506"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4509"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4511"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4517"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4519"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4520"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4521"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4522"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7174"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7175"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7177"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7180"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:38.3.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:38.3.0+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1","1:31.0+build1-0ubuntu0.14.04.1","1:31.1.1+build1-0ubuntu0.14.04.1","1:31.1.2+build1-0ubuntu0.14.04.1","1:31.2.0+build2-0ubuntu0.14.04.1","1:31.3.0+build1-0ubuntu0.14.04.1","1:31.4.0+build1-0ubuntu0.14.04.1","1:31.5.0+build1-0ubuntu0.14.04.1","1:31.6.0+build1-0ubuntu0.14.04.1","1:31.7.0+build1-0ubuntu0.14.04.1","1:31.8.0+build1-0ubuntu0.14.04.1","1:38.2.0+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird"},{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:38.3.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2754-1.json","cves_map":{"cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4500"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4506"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4509"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4511"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4517"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4519"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4520"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4521"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-4522"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-7174"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-7175"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-7176"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-7177"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-7180"}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.5"}