USN-2934-1

Source
https://ubuntu.com/security/notices/USN-2934-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2934-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-2934-1
Upstream
Related
Published
2016-04-27T22:32:50.120074Z
Modified
2025-09-08T16:36:03Z
Summary
thunderbird vulnerabilities
Details

Bob Clary, Christoph Diehl, Christian Holler, Andrew McCreight, Daniel Holbert, Jesse Ruderman, and Randell Jesup discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1952)

Nicolas Golubovic discovered that CSP violation reports can be used to overwrite local files. If a user were tricked in to opening a specially crafted website in a browsing context with addon signing disabled and unpacked addons installed, an attacker could potentially exploit this to gain additional privileges. (CVE-2016-1954)

Jose Martinez and Romina Santillan discovered a memory leak in libstagefright during MPEG4 video file processing in some circumstances. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via memory exhaustion. (CVE-2016-1957)

A use-after-free was discovered in the HTML5 string parser. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1960)

A use-after-free was discovered in the SetBody function of HTMLDocument. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1961)

Nicolas Grégoire discovered a use-after-free during XML transformations. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1964)

A memory corruption issues was discovered in the NPAPI subsystem. If a user were tricked in to opening a specially crafted website in a browsing context with a malicious plugin installed, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1966)

Ronald Crane discovered an out-of-bounds read following a failed allocation in the HTML parser in some circumstances. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1974)

Francis Gabriel discovered a buffer overflow during ASN.1 decoding in NSS. A remote attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1950)

Holger Fuhrmannek, Tyson Smith and Holger Fuhrmannek reported multiple memory safety issues in the Graphite 2 library. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802)

References

Affected packages

Ubuntu:14.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:38.7.2+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:38.7.2+build1-0ubuntu0.14.04.1

Affected versions

1:24.*

1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1

1:31.*

1:31.0+build1-0ubuntu0.14.04.1
1:31.1.1+build1-0ubuntu0.14.04.1
1:31.1.2+build1-0ubuntu0.14.04.1
1:31.2.0+build2-0ubuntu0.14.04.1
1:31.3.0+build1-0ubuntu0.14.04.1
1:31.4.0+build1-0ubuntu0.14.04.1
1:31.5.0+build1-0ubuntu0.14.04.1
1:31.6.0+build1-0ubuntu0.14.04.1
1:31.7.0+build1-0ubuntu0.14.04.1
1:31.8.0+build1-0ubuntu0.14.04.1

1:38.*

1:38.2.0+build1-0ubuntu0.14.04.1
1:38.3.0+build1-0ubuntu0.14.04.1
1:38.4.0+build3-0ubuntu0.14.04.1
1:38.5.1+build2-0ubuntu0.14.04.1
1:38.6.0+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-globalmenu",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-testsuite",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:38.7.2+build1-0ubuntu0.14.04.1"
        }
    ]
}

Ubuntu:16.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:38.7.2+build1-0ubuntu0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:38.7.2+build1-0ubuntu0.16.04.1

Affected versions

1:38.*

1:38.3.0+build1-0ubuntu2
1:38.5.1+build2-0ubuntu1
1:38.6.0+build1-0ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-globalmenu",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-testsuite",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:38.7.2+build1-0ubuntu0.16.04.1"
        }
    ]
}