{"id":"USN-3141-1","summary":"thunderbird vulnerabilities","details":"Christian Holler, Jon Coppeard, Olli Pettay, Ehsan Akhgari, Gary Kwong,\nTooru Fujisawa, and Randell Jesup discovered multiple memory safety issues\nin Thunderbird. If a user were tricked in to opening a specially crafted\nmessage, an attacker could potentially exploit these to cause a denial of\nservice via application crash, or execute arbitrary code. (CVE-2016-5290)\n\nA same-origin policy bypass was discovered with local HTML files in some\ncircumstances. An attacker could potentially exploit this to obtain\nsensitive information. (CVE-2016-5291)\n\nA heap buffer-overflow was discovered in Cairo when processing SVG\ncontent. If a user were tricked in to opening a specially crafted message,\nan attacker could potentially exploit this to cause a denial of service\nvia application crash, or execute arbitrary code. (CVE-2016-5296)\n\nAn error was discovered in argument length checking in Javascript. If a\nuser were tricked in to opening a specially crafted website in a browsing\ncontext, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code. (CVE-2016-5297)\n\nA buffer overflow was discovered in nsScriptLoadHandler. If a user were\ntricked in to opening a specially crafted website in a browsing context,\nan attacker could potentially exploit this to cause a denial of service\nvia application crash, or execute arbitrary code. (CVE-2016-9066)\n\nA use-after-free was discovered in SVG animations. If a user were tricked\nin to opening a specially crafted website in a browsing context, an\nattacker could exploit this to cause a denial of service via application\ncrash, or execute arbitrary code. (CVE-2016-9079)\n","modified":"2026-04-22T09:29:35.949936Z","published":"2016-12-01T00:56:29Z","related":["UBUNTU-CVE-2016-5290","UBUNTU-CVE-2016-5291","UBUNTU-CVE-2016-5296","UBUNTU-CVE-2016-5297","UBUNTU-CVE-2016-9066","UBUNTU-CVE-2016-9079"],"upstream":["CVE-2016-5290","CVE-2016-5291","CVE-2016-5296","CVE-2016-5297","CVE-2016-9066","CVE-2016-9079","UBUNTU-CVE-2016-5290","UBUNTU-CVE-2016-5291","UBUNTU-CVE-2016-5296","UBUNTU-CVE-2016-5297","UBUNTU-CVE-2016-9066","UBUNTU-CVE-2016-9079"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3141-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5290"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5291"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5296"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5297"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9066"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9079"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:45.5.1+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:45.5.1+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1","1:31.0+build1-0ubuntu0.14.04.1","1:31.1.1+build1-0ubuntu0.14.04.1","1:31.1.2+build1-0ubuntu0.14.04.1","1:31.2.0+build2-0ubuntu0.14.04.1","1:31.3.0+build1-0ubuntu0.14.04.1","1:31.4.0+build1-0ubuntu0.14.04.1","1:31.5.0+build1-0ubuntu0.14.04.1","1:31.6.0+build1-0ubuntu0.14.04.1","1:31.7.0+build1-0ubuntu0.14.04.1","1:31.8.0+build1-0ubuntu0.14.04.1","1:38.2.0+build1-0ubuntu0.14.04.1","1:38.3.0+build1-0ubuntu0.14.04.1","1:38.4.0+build3-0ubuntu0.14.04.1","1:38.5.1+build2-0ubuntu0.14.04.1","1:38.6.0+build1-0ubuntu0.14.04.1","1:38.7.2+build1-0ubuntu0.14.04.1","1:38.8.0+build1-0ubuntu0.14.04.1","1:45.2.0+build1-0ubuntu0.14.04.3","1:45.3.0+build1-0ubuntu0.14.04.4","1:45.4.0+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"thunderbird"},{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:45.5.1+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3141-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5290"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5291"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5296"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5297"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-9066"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-9079"}]}}},{"package":{"name":"thunderbird","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:45.5.1+build1-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:45.5.1+build1-0ubuntu0.16.04.1"}]}],"versions":["1:38.3.0+build1-0ubuntu2","1:38.5.1+build2-0ubuntu1","1:38.6.0+build1-0ubuntu1","1:38.7.2+build1-0ubuntu0.16.04.1","1:38.8.0+build1-0ubuntu0.16.04.1","1:45.2.0+build1-0ubuntu0.16.04.1","1:45.3.0+build1-0ubuntu0.16.04.2","1:45.4.0+build1-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"thunderbird"},{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:45.5.1+build1-0ubuntu0.16.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3141-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5290"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5291"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5296"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-5297"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-9066"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-9079"}]}}}],"schema_version":"1.7.5"}