{"id":"USN-4328-1","summary":"thunderbird vulnerabilities","details":"It was discovered that Message ID calculation was based on uninitialized\ndata. An attacker could potentially exploit this to obtain sensitive\ninformation. (CVE-2020-6792)\n\nMutiple security issues were discovered in Thunderbird. If a user were\ntricked in to opening a specially crafted message, an attacker could\npotentially exploit these to cause a denial of service, obtain sensitive\ninformation, or execute arbitrary code. (CVE-2020-6793, CVE-2020-6795,\nCVE-2020-6822)\n\nIt was discovered that if a user saved passwords before Thunderbird 60\nand then later set a master password, an unencrypted copy of these\npasswords would still be accessible. A local user could exploit this to\nobtain sensitive information. (CVE-2020-6794)\n\nMultiple security issues were discovered in Thunderbird. If a user were\ntricked in to opening a specially crafted website in a browsing context,\nan attacker could potentially exploit these to cause a denial of service,\nconduct cross-site scripting (XSS) attacks, obtain sensitive information,\nor execute arbitrary code. (CVE-2019-20503, CVE-2020-6798, CVE-2020-6800,\nCVE-2020-6805, CVE-2020-6806, CVE-2020-6807, CVE-2020-6812, CVE-2020-6814,\nCVE-2020-6819, CVE-2020-6820, CVE-2020-6821, CVE-2020-6825)\n\nIt was discovered that the Devtools’ ‘Copy as cURL’ feature did not\nfully escape website-controlled data. If a user were tricked in to using\nthe ‘Copy as cURL’ feature to copy and paste a command with specially\ncrafted data in to a terminal, an attacker could potentially exploit this\nto execute arbitrary commands via command injection. (CVE-2020-6811)\n","modified":"2026-04-27T15:48:46.659399859Z","published":"2020-04-13T19:46:18Z","related":["UBUNTU-CVE-2019-20503","UBUNTU-CVE-2020-6792","UBUNTU-CVE-2020-6793","UBUNTU-CVE-2020-6794","UBUNTU-CVE-2020-6795","UBUNTU-CVE-2020-6798","UBUNTU-CVE-2020-6800","UBUNTU-CVE-2020-6805","UBUNTU-CVE-2020-6806","UBUNTU-CVE-2020-6807","UBUNTU-CVE-2020-6811","UBUNTU-CVE-2020-6812","UBUNTU-CVE-2020-6814","UBUNTU-CVE-2020-6819","UBUNTU-CVE-2020-6820","UBUNTU-CVE-2020-6821","UBUNTU-CVE-2020-6822","UBUNTU-CVE-2020-6825"],"upstream":["CVE-2019-20503","CVE-2020-6792","CVE-2020-6793","CVE-2020-6794","CVE-2020-6795","CVE-2020-6798","CVE-2020-6800","CVE-2020-6805","CVE-2020-6806","CVE-2020-6807","CVE-2020-6811","CVE-2020-6812","CVE-2020-6814","CVE-2020-6819","CVE-2020-6820","CVE-2020-6821","CVE-2020-6822","CVE-2020-6825","UBUNTU-CVE-2019-20503","UBUNTU-CVE-2020-6792","UBUNTU-CVE-2020-6793","UBUNTU-CVE-2020-6794","UBUNTU-CVE-2020-6795","UBUNTU-CVE-2020-6798","UBUNTU-CVE-2020-6800","UBUNTU-CVE-2020-6805","UBUNTU-CVE-2020-6806","UBUNTU-CVE-2020-6807","UBUNTU-CVE-2020-6811","UBUNTU-CVE-2020-6812","UBUNTU-CVE-2020-6814","UBUNTU-CVE-2020-6819","UBUNTU-CVE-2020-6820","UBUNTU-CVE-2020-6821","UBUNTU-CVE-2020-6822","UBUNTU-CVE-2020-6825"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4328-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-20503"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6792"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6793"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6794"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6795"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6798"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6800"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6805"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6806"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6807"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6811"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6812"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6814"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6819"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6820"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6821"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6822"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-6825"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:68.7.0+build1-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:68.7.0+build1-0ubuntu0.18.04.1"}]}],"versions":["1:52.4.0+build1-0ubuntu2","1:52.6.0+build1-0ubuntu1","1:52.7.0+build1-0ubuntu1","1:52.8.0+build1-0ubuntu0.18.04.1","1:52.9.1+build3-0ubuntu0.18.04.1","1:60.2.1+build1-0ubuntu0.18.04.2","1:60.4.0+build2-0ubuntu0.18.04.1","1:60.5.1+build2-0ubuntu0.18.04.1","1:60.6.1+build2-0ubuntu0.18.04.1","1:60.7.0+build1-0ubuntu0.18.04.1","1:60.7.1+build1-0ubuntu0.18.04.1","1:60.7.2+build2-0ubuntu0.18.04.1","1:60.8.0+build1-0ubuntu0.18.04.1","1:60.9.0+build1-0ubuntu0.18.04.1","1:68.2.1+build1-0ubuntu0.18.04.1","1:68.2.2+build1-0ubuntu0.18.04.1","1:68.4.1+build1-0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:68.7.0+build1-0ubuntu0.18.04.1","binary_name":"thunderbird"},{"binary_version":"1:68.7.0+build1-0ubuntu0.18.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:68.7.0+build1-0ubuntu0.18.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:68.7.0+build1-0ubuntu0.18.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:68.7.0+build1-0ubuntu0.18.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:68.7.0+build1-0ubuntu0.18.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4328-1.json","cves_map":{"cves":[{"id":"CVE-2019-20503","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6792","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-6793","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6794","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6795","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6798","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6800","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6805","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-6806","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6807","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6811","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6812","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-6814","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6819","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2020-6820","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2020-6821","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6822","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-6825","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.5"}