USN-2296-1

Source
https://ubuntu.com/security/notices/USN-2296-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2296-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-2296-1
Upstream
Related
Published
2014-07-22T21:08:37.462676Z
Modified
2025-09-08T16:35:56Z
Summary
thunderbird vulnerabilities
Details

Christian Holler, David Keeler and Byron Campen discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1547)

Atte Kettunen discovered a buffer overflow when interacting with WebAudio buffers. If a user had enabled scripting, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1549)

Atte Kettunen discovered a use-after-free in WebAudio. If a user had enabled scripting, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1550)

Jethro Beekman discovered a use-after-free when the FireOnStateChange event is triggered in some circumstances. If a user had enabled scripting, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Thunderbird. (CVE-2014-1555)

Patrick Cozzi discovered a crash when using the Cesium JS library to generate WebGL content. If a user had enabled scripting, an attacker could potentially exploit this to execute arbitrary code with the privilges of the user invoking Thunderbird. (CVE-2014-1556)

Tyson Smith and Jesse Schwartzentruber discovered a use-after-free in CERT_DestroyCertificate. If a user had enabled scripting, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1544)

A crash was discovered in Skia when scaling an image, if the scaling operation takes too long. If a user had enabled scripting, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2014-1557)

Christian Holler discovered several issues when parsing certificates with non-standard character encoding, resulting in the inability to use valid SSL certificates in some circumstances. (CVE-2014-1558, CVE-2014-1559, CVE-2014-1560)

Boris Zbarsky discovered that network redirects could cause an iframe to escape the confinements defined by its sandbox attribute in some circumstances. If a user had enabled scripting, an attacker could potentially exploit this to conduct cross-site scripting attacks. (CVE-2014-1552)

References

Affected packages

Ubuntu:14.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:31.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:31.0+build1-0ubuntu0.14.04.1

Affected versions

1:24.*

1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-dev"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-globalmenu"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-gnome-support"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-mozsymbols"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-testsuite"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-calendar-timezones"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-gdata-provider"
        },
        {
            "binary_version": "1:31.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-lightning"
        }
    ]
}