Debian DLA-2874-1:thunderbird - LTS 安全更新

critical Nessus 插件 ID 156457

简介

远程 Debian 主机上缺少一个或多个与安全性相关的更新。

描述

远程 Debian 9 主机上安装的程序包受到 dla-2874 公告中提及的多个漏洞影响。

- 在 MessageTasks 上操作期间,任务可能还在计划阶段就被删除,这将造成内存损坏并可能引发被恶意利用的崩溃问题。此漏洞会影响 Thunderbird < 78.15、Thunderbird < 91.2、Firefox ESR < 91.2、Firefox ESR < 78.15 以及 Firefox < 93。(CVE-2021-38496)

- Mozilla 开发人员报告 Firefox 92 和 Firefox ESR 91.1 中存在内存安全错误。其中某些错误展示出内存损坏迹象,我们推测如果攻击者进行足够的尝试,则可以利用此漏洞运行任意代码。此漏洞会影响 Thunderbird < 78.15、Thunderbird < 91.2、Firefox ESR < 91.2、Firefox ESR < 78.15 以及 Firefox < 93。(CVE-2021-38500)

- Thunderbird 忽略了 SMTP 连接需要 STARTTLS 安全性的配置。MITM 可执行降级攻击以拦截传输的消息,或可控制经过身份验证的会话以执行 MITM 所选的 SMTP 命令。如果配置了不受保护的身份验证方法,MITM 也可以获取身份验证凭据。此漏洞影响 Thunderbird < 91.2。(CVE-2021-38502)

- iframe 沙盒规则未正确应用到 XSLT 样式表,从而允许 iframe 绕过限制,例如执行脚本或浏览顶层框架。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 94 的 Firefox 和版本低于 91.3 的 Thunderbird。(CVE-2021-38503)

- 在设置 webkitdirectory 的情况下与 HTML 输入元素的文件选择器对话框交互时,可能会发生释放后使用,从而导致内存损坏以及可能遭受攻击的崩溃。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 94 的 Firefox 和版本低于 91.3 的 Thunderbird。(CVE-2021-38504)

- 通过一系列导航,Firefox 可在不通知或警告用户的情况下进入全屏模式。这可能导致对浏览器 UI 的欺骗攻击,包括钓鱼攻击。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 94 的 Firefox 和版本低于 91.3 的 Thunderbird。(CVE-2021-38506)

- HTTP2 (RFC 8164) 的机会性加密功能允许连接透明地升级到 TLS ,同时保留 HTTP 连接的可视化属性,包括与端口 80 上的未加密连接同源。但是,如果相同 IP 地址上的第二个加密端口(例如端口 8443)未选择加入机会性加密,网络攻击者可将浏览器到 443 端口的连接转发到 8443 端口,从而导致浏览器将 8443 端口的内容视为与 HTTP 同源。已通过禁用使用率较低的机会加密功能解决了此问题。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 94 的 Firefox 和版本低于 91.3 的 Thunderbird。(CVE-2021-38507)

- 若在收到显示权限提示(例如地理位置)的同时于正确位置显示表单有效性消息,则有效性消息可能已经掩盖提示,导致用户可能被诱骗授予权限。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 94 的 Firefox 和版本低于 91.3 的 Thunderbird。(CVE-2021-38508)

- 由于受攻击者控制的事件出现序列异常问题,包含任意(尽管无样式)内容的 Javascript alert() 对话框可显示在攻击者选择的不受控网页之上。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 94 的 Firefox 和版本低于 91.3 的 Thunderbird。
(CVE-2021-38509)

- Thunderbird 在合成区域意外启用了 JavaScript。JavaScript 仅限在此区域执行上下文,并未获得 chrome 级别的权限,但可以在此基础上利用其他漏洞发动进一步攻击。此漏洞会影响 Thunderbird < 91.4.0。
(CVE-2021-43528)

- Mozilla 开发人员和社区成员报告 Firefox 93 与 Firefox ESR 91.2 中存在内存安全错误。其中某些错误展示出内存损坏迹象,我们推测如果攻击者进行足够的尝试,则可以利用此漏洞运行任意代码。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 94 的 Firefox 和版本低于 91.3 的 Thunderbird。(CVE-2021-43534)

- 在其他线程上释放 HTTP2 会话对象时可能会发生释放后使用,从而导致内存损坏和可能遭到恶意利用的崩溃。此漏洞会影响版本低于 91.3 的 Firefox ESR、版本低于 93 的 Firefox 和版本低于 91.3 的 Thunderbird。(CVE-2021-43535)

- 在某些情况下,异步函数会导致导航失败,从而暴露目标 URL。此漏洞会影响版本低于 91.4.0 的 Thunderbird、版本低于 91.4.0 的 Firefox ESR 以及版本低于 95 的 Firefox。
(CVE-2021-43536)

- 从 64 位到 32 位整数大小的错误类型转换会允许攻击者损坏内存,从而导致主机可能因恶意利用漏洞发生崩溃。此漏洞会影响版本低于 91.4.0 的 Thunderbird 以及版本低于 91.4.0 的 Firefox ESR。(CVE-2021-43537)

- 通过滥用通知代码中的争用,攻击者可以强制隐藏已接收全屏和指针锁定访问的页面的通知,但此漏洞可能会被用于发动欺骗攻击。此漏洞会影响版本低于 91.4.0 的 Thunderbird、版本低于 91.4.0 的 Firefox ESR 以及版本低于 95 的 Firefox。
(CVE-2021-43538)

- 未能正确记录跨 wasm 实例调用的实时指针位置,这会导致未跟踪这些实时指针的调用内发生 GC。这会导造成释放后使用,从而导致可能会被利用的崩溃。此漏洞会影响版本低于 91.4.0 的 Thunderbird 以及版本低于 91.4.0 的 Firefox ESR。(CVE-2021-43539)

- 调用外部协议的协议处理程序时,未正确转义所提供的包含空格的参数 URL。此漏洞会影响版本低于 91.4.0 的 Thunderbird、版本低于 91.4.0 的 Firefox ESR 以及版本低于 95 的 Firefox。
(CVE-2021-43541)

- 使用 XMLHttpRequest 时,攻击者可通过探测错误消息来加载外部协议,从而识别已安装的应用程序。此漏洞会影响版本低于 91.4.0 的 Thunderbird 以及版本低于 91.4.0 的 Firefox ESR。(CVE-2021-43542)

- 使用 CSP 沙盒指令加载的文档可通过嵌入其他内容避开沙盒的脚本限制。此漏洞会影响版本低于 91.4.0 的 Thunderbird 以及版本低于 91.4.0 的 Firefox ESR。(CVE-2021-43543)

- 在循环中使用 Location API 会导致严重的应用程序挂起和崩溃。此漏洞会影响版本低于 91.4.0 的 Thunderbird 以及版本低于 91.4.0 的 Firefox ESR。(CVE-2021-43545)

- 可以使用经过缩放的本机光标重新创建之前针对用户的光标欺骗攻击。
此漏洞会影响版本低于 91.4.0 的 Thunderbird 以及版本低于 91.4.0 的 Firefox ESR。(CVE-2021-43546)

- 3.2.7 之前版本的 Matrix libolm 中的 olm_session_describe 函数容易受到缓冲区溢出影响。Olm 会话对象代表两方之间的加密通道。因此,通道的远程方可部分控制其状态。攻击者可以针对部分缓冲区大小构建一个特制的消息序列,以便在调用 olm_session_describe 时导致缓冲区溢出,进而操纵接收方会话的状态。此外,安全缓冲区大小并未记录。攻击者可控制部分溢出内容,但仅限 ASCII 空格和数字。已知受影响的产品是 Element Web 和 SchildiChat Web。(CVE-2021-44538)

请注意,Nessus 尚未测试此问题,而是只依靠应用程序自我报告的版本号来判断。

解决方案

升级 thunderbird 程序包。

针对 Debian 9 Stretch,这些问题已在版本 1 中解决

另见

https://security-tracker.debian.org/tracker/source-package/thunderbird

https://www.debian.org/lts/security/2022/dla-2874

https://security-tracker.debian.org/tracker/CVE-2021-38496

https://security-tracker.debian.org/tracker/CVE-2021-38500

https://security-tracker.debian.org/tracker/CVE-2021-38502

https://security-tracker.debian.org/tracker/CVE-2021-38503

https://security-tracker.debian.org/tracker/CVE-2021-38504

https://security-tracker.debian.org/tracker/CVE-2021-38506

https://security-tracker.debian.org/tracker/CVE-2021-38507

https://security-tracker.debian.org/tracker/CVE-2021-38508

https://security-tracker.debian.org/tracker/CVE-2021-38509

https://security-tracker.debian.org/tracker/CVE-2021-4126

https://security-tracker.debian.org/tracker/CVE-2021-43528

https://security-tracker.debian.org/tracker/CVE-2021-43529

https://security-tracker.debian.org/tracker/CVE-2021-43534

https://security-tracker.debian.org/tracker/CVE-2021-43535

https://security-tracker.debian.org/tracker/CVE-2021-43536

https://security-tracker.debian.org/tracker/CVE-2021-43537

https://security-tracker.debian.org/tracker/CVE-2021-43538

https://security-tracker.debian.org/tracker/CVE-2021-43539

https://security-tracker.debian.org/tracker/CVE-2021-43541

https://security-tracker.debian.org/tracker/CVE-2021-43542

https://security-tracker.debian.org/tracker/CVE-2021-43543

https://security-tracker.debian.org/tracker/CVE-2021-43545

https://security-tracker.debian.org/tracker/CVE-2021-43546

https://security-tracker.debian.org/tracker/CVE-2021-44538

https://packages.debian.org/source/stretch/thunderbird

插件详情

严重性: Critical

ID: 156457

文件名: debian_DLA-2874.nasl

版本: 1.8

类型: local

代理: unix

发布时间: 2022/1/4

最近更新时间: 2022/5/6

支持的传感器: Frictionless Assessment Agent, Nessus Agent

风险信息

CVSS 分数来源: CVE-2021-44538

VPR

风险因素: High

分数: 8.1

CVSS v2

风险因素: High

基本分数: 7.5

时间分数: 5.5

矢量: AV:N/AC:L/Au:N/C:P/I:P/A:P

时间矢量: E:U/RL:OF/RC:C

CVSS v3

风险因素: Critical

基本分数: 10

时间分数: 8.7

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

时间矢量: E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:calendar-google-provider, p-cpe:/a:debian:debian_linux:icedove, p-cpe:/a:debian:debian_linux:icedove-dbg, p-cpe:/a:debian:debian_linux:icedove-dev, p-cpe:/a:debian:debian_linux:icedove-l10n-all, p-cpe:/a:debian:debian_linux:icedove-l10n-ar, p-cpe:/a:debian:debian_linux:icedove-l10n-ast, p-cpe:/a:debian:debian_linux:icedove-l10n-be, p-cpe:/a:debian:debian_linux:icedove-l10n-bg, p-cpe:/a:debian:debian_linux:icedove-l10n-bn-bd, p-cpe:/a:debian:debian_linux:icedove-l10n-br, p-cpe:/a:debian:debian_linux:icedove-l10n-ca, p-cpe:/a:debian:debian_linux:icedove-l10n-cs, p-cpe:/a:debian:debian_linux:icedove-l10n-da, p-cpe:/a:debian:debian_linux:icedove-l10n-de, p-cpe:/a:debian:debian_linux:icedove-l10n-dsb, p-cpe:/a:debian:debian_linux:icedove-l10n-el, p-cpe:/a:debian:debian_linux:icedove-l10n-en-gb, p-cpe:/a:debian:debian_linux:icedove-l10n-es-ar, p-cpe:/a:debian:debian_linux:icedove-l10n-es-es, p-cpe:/a:debian:debian_linux:icedove-l10n-et, p-cpe:/a:debian:debian_linux:icedove-l10n-eu, p-cpe:/a:debian:debian_linux:icedove-l10n-fi, p-cpe:/a:debian:debian_linux:icedove-l10n-fr, p-cpe:/a:debian:debian_linux:icedove-l10n-fy-nl, p-cpe:/a:debian:debian_linux:icedove-l10n-ga-ie, p-cpe:/a:debian:debian_linux:icedove-l10n-gd, p-cpe:/a:debian:debian_linux:icedove-l10n-gl, p-cpe:/a:debian:debian_linux:icedove-l10n-he, p-cpe:/a:debian:debian_linux:icedove-l10n-hr, p-cpe:/a:debian:debian_linux:icedove-l10n-hsb, p-cpe:/a:debian:debian_linux:icedove-l10n-hu, p-cpe:/a:debian:debian_linux:icedove-l10n-hy-am, p-cpe:/a:debian:debian_linux:icedove-l10n-id, p-cpe:/a:debian:debian_linux:icedove-l10n-is, p-cpe:/a:debian:debian_linux:icedove-l10n-it, p-cpe:/a:debian:debian_linux:icedove-l10n-ja, p-cpe:/a:debian:debian_linux:icedove-l10n-kab, p-cpe:/a:debian:debian_linux:icedove-l10n-ko, p-cpe:/a:debian:debian_linux:icedove-l10n-lt, p-cpe:/a:debian:debian_linux:icedove-l10n-nb-no, p-cpe:/a:debian:debian_linux:icedove-l10n-nl, p-cpe:/a:debian:debian_linux:icedove-l10n-nn-no, p-cpe:/a:debian:debian_linux:icedove-l10n-pa-in, p-cpe:/a:debian:debian_linux:icedove-l10n-pl, p-cpe:/a:debian:debian_linux:icedove-l10n-pt-br, p-cpe:/a:debian:debian_linux:icedove-l10n-pt-pt, p-cpe:/a:debian:debian_linux:icedove-l10n-rm, p-cpe:/a:debian:debian_linux:icedove-l10n-ro, p-cpe:/a:debian:debian_linux:icedove-l10n-ru, p-cpe:/a:debian:debian_linux:icedove-l10n-si, p-cpe:/a:debian:debian_linux:icedove-l10n-sk, p-cpe:/a:debian:debian_linux:icedove-l10n-sl, p-cpe:/a:debian:debian_linux:icedove-l10n-sq, p-cpe:/a:debian:debian_linux:icedove-l10n-sr, p-cpe:/a:debian:debian_linux:icedove-l10n-sv-se, p-cpe:/a:debian:debian_linux:icedove-l10n-ta-lk, p-cpe:/a:debian:debian_linux:icedove-l10n-tr, p-cpe:/a:debian:debian_linux:icedove-l10n-uk, p-cpe:/a:debian:debian_linux:icedove-l10n-vi, p-cpe:/a:debian:debian_linux:icedove-l10n-zh-cn, p-cpe:/a:debian:debian_linux:icedove-l10n-zh-tw, p-cpe:/a:debian:debian_linux:iceowl-extension, p-cpe:/a:debian:debian_linux:iceowl-l10n-ar, p-cpe:/a:debian:debian_linux:iceowl-l10n-ast, p-cpe:/a:debian:debian_linux:iceowl-l10n-be, p-cpe:/a:debian:debian_linux:iceowl-l10n-bg, p-cpe:/a:debian:debian_linux:iceowl-l10n-bn-bd, p-cpe:/a:debian:debian_linux:iceowl-l10n-br, p-cpe:/a:debian:debian_linux:iceowl-l10n-ca, p-cpe:/a:debian:debian_linux:iceowl-l10n-cs, p-cpe:/a:debian:debian_linux:iceowl-l10n-cy, p-cpe:/a:debian:debian_linux:iceowl-l10n-da, p-cpe:/a:debian:debian_linux:iceowl-l10n-de, p-cpe:/a:debian:debian_linux:iceowl-l10n-dsb, p-cpe:/a:debian:debian_linux:iceowl-l10n-el, p-cpe:/a:debian:debian_linux:iceowl-l10n-en-gb, p-cpe:/a:debian:debian_linux:iceowl-l10n-es-ar, p-cpe:/a:debian:debian_linux:iceowl-l10n-es-es, p-cpe:/a:debian:debian_linux:iceowl-l10n-et, p-cpe:/a:debian:debian_linux:iceowl-l10n-eu, p-cpe:/a:debian:debian_linux:iceowl-l10n-fi, p-cpe:/a:debian:debian_linux:iceowl-l10n-fr, p-cpe:/a:debian:debian_linux:iceowl-l10n-fy-nl, p-cpe:/a:debian:debian_linux:iceowl-l10n-ga-ie, p-cpe:/a:debian:debian_linux:iceowl-l10n-gd, p-cpe:/a:debian:debian_linux:iceowl-l10n-gl, p-cpe:/a:debian:debian_linux:iceowl-l10n-he, p-cpe:/a:debian:debian_linux:iceowl-l10n-hr, p-cpe:/a:debian:debian_linux:iceowl-l10n-hsb, p-cpe:/a:debian:debian_linux:iceowl-l10n-hu, p-cpe:/a:debian:debian_linux:iceowl-l10n-hy-am, p-cpe:/a:debian:debian_linux:iceowl-l10n-id, p-cpe:/a:debian:debian_linux:iceowl-l10n-is, p-cpe:/a:debian:debian_linux:iceowl-l10n-it, p-cpe:/a:debian:debian_linux:iceowl-l10n-ja, p-cpe:/a:debian:debian_linux:iceowl-l10n-kab, p-cpe:/a:debian:debian_linux:iceowl-l10n-ko, p-cpe:/a:debian:debian_linux:iceowl-l10n-lt, p-cpe:/a:debian:debian_linux:iceowl-l10n-nb-no, p-cpe:/a:debian:debian_linux:iceowl-l10n-nl, p-cpe:/a:debian:debian_linux:iceowl-l10n-nn-no, p-cpe:/a:debian:debian_linux:iceowl-l10n-pa-in, p-cpe:/a:debian:debian_linux:iceowl-l10n-pl, p-cpe:/a:debian:debian_linux:iceowl-l10n-pt-br, p-cpe:/a:debian:debian_linux:iceowl-l10n-pt-pt, p-cpe:/a:debian:debian_linux:iceowl-l10n-rm, p-cpe:/a:debian:debian_linux:iceowl-l10n-ro, p-cpe:/a:debian:debian_linux:iceowl-l10n-ru, p-cpe:/a:debian:debian_linux:iceowl-l10n-si, p-cpe:/a:debian:debian_linux:iceowl-l10n-sk, p-cpe:/a:debian:debian_linux:iceowl-l10n-sl, p-cpe:/a:debian:debian_linux:iceowl-l10n-sq, p-cpe:/a:debian:debian_linux:iceowl-l10n-sr, p-cpe:/a:debian:debian_linux:iceowl-l10n-sv-se, p-cpe:/a:debian:debian_linux:iceowl-l10n-ta-lk, p-cpe:/a:debian:debian_linux:iceowl-l10n-tr, p-cpe:/a:debian:debian_linux:iceowl-l10n-uk, p-cpe:/a:debian:debian_linux:iceowl-l10n-vi, p-cpe:/a:debian:debian_linux:iceowl-l10n-zh-cn, p-cpe:/a:debian:debian_linux:iceowl-l10n-zh-tw, p-cpe:/a:debian:debian_linux:lightning, p-cpe:/a:debian:debian_linux:lightning-l10n-ar, p-cpe:/a:debian:debian_linux:lightning-l10n-ast, p-cpe:/a:debian:debian_linux:lightning-l10n-be, p-cpe:/a:debian:debian_linux:lightning-l10n-bg, p-cpe:/a:debian:debian_linux:lightning-l10n-bn-bd, p-cpe:/a:debian:debian_linux:lightning-l10n-br, p-cpe:/a:debian:debian_linux:lightning-l10n-ca, p-cpe:/a:debian:debian_linux:lightning-l10n-cs, p-cpe:/a:debian:debian_linux:lightning-l10n-cy, p-cpe:/a:debian:debian_linux:lightning-l10n-da, p-cpe:/a:debian:debian_linux:lightning-l10n-de, p-cpe:/a:debian:debian_linux:lightning-l10n-dsb, p-cpe:/a:debian:debian_linux:lightning-l10n-el, p-cpe:/a:debian:debian_linux:lightning-l10n-en-gb, p-cpe:/a:debian:debian_linux:lightning-l10n-es-ar, p-cpe:/a:debian:debian_linux:lightning-l10n-es-es, p-cpe:/a:debian:debian_linux:lightning-l10n-et, p-cpe:/a:debian:debian_linux:lightning-l10n-eu, p-cpe:/a:debian:debian_linux:lightning-l10n-fi, p-cpe:/a:debian:debian_linux:lightning-l10n-fr, p-cpe:/a:debian:debian_linux:lightning-l10n-fy-nl, p-cpe:/a:debian:debian_linux:lightning-l10n-ga-ie, p-cpe:/a:debian:debian_linux:lightning-l10n-gd, p-cpe:/a:debian:debian_linux:lightning-l10n-gl, p-cpe:/a:debian:debian_linux:lightning-l10n-he, p-cpe:/a:debian:debian_linux:lightning-l10n-hr, p-cpe:/a:debian:debian_linux:lightning-l10n-hsb, p-cpe:/a:debian:debian_linux:lightning-l10n-hu, p-cpe:/a:debian:debian_linux:lightning-l10n-hy-am, p-cpe:/a:debian:debian_linux:lightning-l10n-id, p-cpe:/a:debian:debian_linux:lightning-l10n-is, p-cpe:/a:debian:debian_linux:lightning-l10n-it, p-cpe:/a:debian:debian_linux:lightning-l10n-ja, p-cpe:/a:debian:debian_linux:lightning-l10n-kab, p-cpe:/a:debian:debian_linux:lightning-l10n-kk, p-cpe:/a:debian:debian_linux:lightning-l10n-ko, p-cpe:/a:debian:debian_linux:lightning-l10n-lt, p-cpe:/a:debian:debian_linux:lightning-l10n-ms, p-cpe:/a:debian:debian_linux:lightning-l10n-nb-no, p-cpe:/a:debian:debian_linux:lightning-l10n-nl, p-cpe:/a:debian:debian_linux:lightning-l10n-nn-no, p-cpe:/a:debian:debian_linux:lightning-l10n-pa-in, p-cpe:/a:debian:debian_linux:lightning-l10n-pl, p-cpe:/a:debian:debian_linux:lightning-l10n-pt-br, p-cpe:/a:debian:debian_linux:lightning-l10n-pt-pt, p-cpe:/a:debian:debian_linux:lightning-l10n-rm, p-cpe:/a:debian:debian_linux:lightning-l10n-ro, p-cpe:/a:debian:debian_linux:lightning-l10n-ru, p-cpe:/a:debian:debian_linux:lightning-l10n-si, p-cpe:/a:debian:debian_linux:lightning-l10n-sk, p-cpe:/a:debian:debian_linux:lightning-l10n-sl, p-cpe:/a:debian:debian_linux:lightning-l10n-sq, p-cpe:/a:debian:debian_linux:lightning-l10n-sr, p-cpe:/a:debian:debian_linux:lightning-l10n-sv-se, p-cpe:/a:debian:debian_linux:lightning-l10n-ta-lk, p-cpe:/a:debian:debian_linux:lightning-l10n-tr, p-cpe:/a:debian:debian_linux:lightning-l10n-uk, p-cpe:/a:debian:debian_linux:lightning-l10n-vi, p-cpe:/a:debian:debian_linux:lightning-l10n-zh-cn, p-cpe:/a:debian:debian_linux:lightning-l10n-zh-tw, p-cpe:/a:debian:debian_linux:thunderbird, p-cpe:/a:debian:debian_linux:thunderbird-dbg, p-cpe:/a:debian:debian_linux:thunderbird-dev, p-cpe:/a:debian:debian_linux:thunderbird-l10n-af, p-cpe:/a:debian:debian_linux:thunderbird-l10n-all, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ast, p-cpe:/a:debian:debian_linux:thunderbird-l10n-be, p-cpe:/a:debian:debian_linux:thunderbird-l10n-bg, p-cpe:/a:debian:debian_linux:thunderbird-l10n-bn-bd, p-cpe:/a:debian:debian_linux:thunderbird-l10n-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cak, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cs, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cy, p-cpe:/a:debian:debian_linux:thunderbird-l10n-da, p-cpe:/a:debian:debian_linux:thunderbird-l10n-de, p-cpe:/a:debian:debian_linux:thunderbird-l10n-dsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-el, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-gb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-es, p-cpe:/a:debian:debian_linux:thunderbird-l10n-et, p-cpe:/a:debian:debian_linux:thunderbird-l10n-eu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fy-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ga-ie, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gd, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-he, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hy-am, p-cpe:/a:debian:debian_linux:thunderbird-l10n-id, p-cpe:/a:debian:debian_linux:thunderbird-l10n-is, p-cpe:/a:debian:debian_linux:thunderbird-l10n-it, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ja, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ka, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kab, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ko, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lv, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ms, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nb-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nn-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pa-in, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-pt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-rm, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ro, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ru, p-cpe:/a:debian:debian_linux:thunderbird-l10n-si, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sq, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sv-se, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ta-lk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-th, p-cpe:/a:debian:debian_linux:thunderbird-l10n-tr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uz, p-cpe:/a:debian:debian_linux:thunderbird-l10n-vi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-cn, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-tw, cpe:/o:debian:debian_linux:9.0

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

易利用性: No known exploits are available

补丁发布日期: 2022/1/4

漏洞发布日期: 2021/10/5

参考资料信息

CVE: CVE-2021-4126, CVE-2021-38496, CVE-2021-38500, CVE-2021-38502, CVE-2021-38503, CVE-2021-38504, CVE-2021-38506, CVE-2021-38507, CVE-2021-38508, CVE-2021-38509, CVE-2021-43528, CVE-2021-43529, CVE-2021-43534, CVE-2021-43535, CVE-2021-43536, CVE-2021-43537, CVE-2021-43538, CVE-2021-43539, CVE-2021-43541, CVE-2021-43542, CVE-2021-43543, CVE-2021-43545, CVE-2021-43546, CVE-2021-44538

IAVA: 2021-A-0461-S, 2021-A-0527-S, 2021-A-0603-S, 2021-A-0569-S, 2021-A-0450-S