Mozilla Released Security Updates for Thunderbird & Fixed Critical Security Flaws

Mozilla Released Security Updates for critical vulnerabilities that affected Thunderbird Mail client. The update fixes three high-level vulnerabilities and one low-level of vulnerability.

Mozilla Thunderbird is a free and open-source cross-platform email client, RSS and chats client developed by the Mozilla Foundation and it is installed by default on Ubuntu desktop systems. It is one of the most used email clients on all operating systems.

The vulnerability resides in the implementation of iCal that causes a overflows in processing certain email messages resulting in a potentially exploitable crash. Following are the vulnerabilities.

CVE-2019-11703: Heap buffer overflow in icalparser.c

A flaw in Thunderbird’s implementation of iCal causes a heap buffer overflow in parser_get_next_charwhen processing certain email messages, resulting in a potentially exploitable crash.

CVE-2019-11704: Heap buffer overflow in icalvalue.c

A flaw in Thunderbird’s implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash.

CVE-2019-11705: Stack buffer overflow in icalrecur.c

A flaw in Thunderbird’s implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash.

CVE-2019-11706: Type confusion in icalproperty.c

A flaw in Thunderbird’s implementation of iCal causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash.

Also, the Thunderbird 60.7.1 comes with a fix for a bug removing the prompt for smartcard PIN when S/MIME signing was used.

Also Read

Mozilla Releases Critical Security Update

Mozilla Released Security Updates for Thunderbird & Fixed Critical Security Flaws

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender and…

8 minutes ago

Weaponized Python Scripts Deliver New SwaetRAT Malware

The Python script leverages low-level interactions with the Windows operating system, which imports crucial libraries…

14 minutes ago

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as analysis…

27 minutes ago

Malicious npm Packages Stealing Developers’ Sensitive Data

Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where these…

30 minutes ago

Garak – An Open Source LLM Vulnerability Scanner for AI Red-Teaming

Garak is a free, open-source tool specifically designed to test the robustness and reliability of…

43 minutes ago

Cybersecurity Firm Tenable’s CEO “Amit Yoran” has Died at 54

Tenable Holdings, Inc. has confirmed the passing of its esteemed Chairman and Chief Executive Officer,…

1 hour ago