Debian dla-3748:thunderbird - 安全更新

high Nessus 插件 ID 191490

简介

远程 Debian 主机上缺少一个或多个与安全性相关的更新。

描述

远程 Debian 10 主机上安装的程序包受到 dla-3748 公告中提及的多个漏洞影响。

- 当在网络通道上存储和重新访问数据时,缓冲区长度可能受到混淆,进而导致越界内存读取攻击。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1546)

- 通过一系列 API 调用和重定向,由攻击者控制的警报对话框可能会在其他网站上显示(显示受害者网站的 URL)。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1547)

- 网站可通过使用下拉选择输入元素掩盖全屏通知。这有可能导致用户混淆或潜在的欺骗攻击。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1548)

- 如果网站设置了大型自定义光标,则光标的部分内容可能与权限对话框重叠,从而可能导致用户混淆和意外授予权限。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1549)

- 恶意网站可结合使用退出全屏模式和 `requestPointerLock`,造成用户鼠标意外重新定位,进而导致用户混淆,并无意中授予不该授予的权限。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1550)

- 多部分 HTTP 响应中未正确遵循 Set-Cookie 响应标头。如果攻击者可以控制 Content-Type 响应标头以及部分响应正文,则可注入浏览器遵循的 Set-Cookie 响应标头。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1551)

- 错误代码生成可导致意外数值转换和潜在的未定义行为。*注意:* 此问题仅影响 32 位 ARM 设备。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1552)

- 在 Firefox 122、Firefox ESR 115.7 和 Thunderbird 115.7 中修复了内存安全缺陷。其中某些错误展示出内存损坏迹象,我们推测如果攻击者进行足够的尝试,则可以利用此漏洞运行任意代码。该漏洞影响 Firefox < 123、Firefox ESR < 115.8 和 Thunderbird < 115.8。(CVE-2024-1553)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

升级 thunderbird 程序包。

另见

https://security-tracker.debian.org/tracker/source-package/thunderbird

https://security-tracker.debian.org/tracker/CVE-2024-1546

https://security-tracker.debian.org/tracker/CVE-2024-1547

https://security-tracker.debian.org/tracker/CVE-2024-1548

https://security-tracker.debian.org/tracker/CVE-2024-1549

https://security-tracker.debian.org/tracker/CVE-2024-1550

https://security-tracker.debian.org/tracker/CVE-2024-1551

https://security-tracker.debian.org/tracker/CVE-2024-1552

https://security-tracker.debian.org/tracker/CVE-2024-1553

https://packages.debian.org/source/buster/thunderbird

插件详情

严重性: High

ID: 191490

文件名: debian_DLA-3748.nasl

版本: 1.1

类型: local

代理: unix

发布时间: 2024/3/4

最近更新时间: 2024/3/21

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 5.9

CVSS v2

风险因素: High

基本分数: 7.6

时间分数: 5.6

矢量: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2024-1553

CVSS v3

风险因素: High

基本分数: 7.5

时间分数: 6.5

矢量: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:thunderbird, p-cpe:/a:debian:debian_linux:thunderbird-l10n-af, p-cpe:/a:debian:debian_linux:thunderbird-l10n-all, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ast, p-cpe:/a:debian:debian_linux:thunderbird-l10n-be, p-cpe:/a:debian:debian_linux:thunderbird-l10n-bg, p-cpe:/a:debian:debian_linux:thunderbird-l10n-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cak, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cs, p-cpe:/a:debian:debian_linux:thunderbird-l10n-cy, p-cpe:/a:debian:debian_linux:thunderbird-l10n-da, p-cpe:/a:debian:debian_linux:thunderbird-l10n-de, p-cpe:/a:debian:debian_linux:thunderbird-l10n-dsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-el, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-ca, p-cpe:/a:debian:debian_linux:thunderbird-l10n-en-gb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-ar, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-es, p-cpe:/a:debian:debian_linux:thunderbird-l10n-es-mx, p-cpe:/a:debian:debian_linux:thunderbird-l10n-et, p-cpe:/a:debian:debian_linux:thunderbird-l10n-eu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-fy-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ga-ie, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gd, p-cpe:/a:debian:debian_linux:thunderbird-l10n-gl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-he, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hsb, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hu, p-cpe:/a:debian:debian_linux:thunderbird-l10n-hy-am, p-cpe:/a:debian:debian_linux:thunderbird-l10n-id, p-cpe:/a:debian:debian_linux:thunderbird-l10n-is, p-cpe:/a:debian:debian_linux:thunderbird-l10n-it, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ja, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ka, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kab, p-cpe:/a:debian:debian_linux:thunderbird-l10n-kk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ko, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-lv, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ms, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nb-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-nn-no, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pa-in, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-br, p-cpe:/a:debian:debian_linux:thunderbird-l10n-pt-pt, p-cpe:/a:debian:debian_linux:thunderbird-l10n-rm, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ro, p-cpe:/a:debian:debian_linux:thunderbird-l10n-ru, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sl, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sq, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-sv-se, p-cpe:/a:debian:debian_linux:thunderbird-l10n-th, p-cpe:/a:debian:debian_linux:thunderbird-l10n-tr, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uk, p-cpe:/a:debian:debian_linux:thunderbird-l10n-uz, p-cpe:/a:debian:debian_linux:thunderbird-l10n-vi, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-cn, p-cpe:/a:debian:debian_linux:thunderbird-l10n-zh-tw, cpe:/o:debian:debian_linux:10.0

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

易利用性: No known exploits are available

补丁发布日期: 2024/3/4

漏洞发布日期: 2024/2/20

参考资料信息

CVE: CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553

IAVA: 2024-A-0108-S