{"id":"USN-2973-1","summary":"thunderbird vulnerabilities","details":"Christian Holler, Tyson Smith, and Phil Ringalda discovered multiple\nmemory safety issues in Thunderbird. If a user were tricked in to opening\na specially crafted message, an attacker could potentially exploit these\nto cause a denial of service via application crash, or execute arbitrary\ncode. (CVE-2016-2805, CVE-2016-2807)\n\nHanno Böck discovered that calculations with mp_div and mp_exptmod in NSS\nproduce incorrect results in some circumstances, resulting in\ncryptographic weaknesses. (CVE-2016-1938)\n\nA use-after-free was discovered in ssl3_HandleECDHServerKeyExchange in\nNSS. A remote attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code. (CVE-2016-1978)\n\nA use-after-free was discovered in PK11_ImportDERPrivateKeyInfoAndReturnKey\nin NSS. A remote attacker could potentially exploit this to cause a denial\nof service via application crash, or execute arbitrary code.\n(CVE-2016-1979)\n","modified":"2026-04-22T09:23:45.045754Z","published":"2016-05-19T00:25:53Z","related":["UBUNTU-CVE-2016-1938","UBUNTU-CVE-2016-1978","UBUNTU-CVE-2016-1979","UBUNTU-CVE-2016-2805","UBUNTU-CVE-2016-2807"],"upstream":["CVE-2016-1938","CVE-2016-1978","CVE-2016-1979","CVE-2016-2805","CVE-2016-2807","UBUNTU-CVE-2016-1938","UBUNTU-CVE-2016-1978","UBUNTU-CVE-2016-1979","UBUNTU-CVE-2016-2805","UBUNTU-CVE-2016-2807"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2973-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1938"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1978"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1979"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2805"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2807"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:38.8.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:38.8.0+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1","1:31.0+build1-0ubuntu0.14.04.1","1:31.1.1+build1-0ubuntu0.14.04.1","1:31.1.2+build1-0ubuntu0.14.04.1","1:31.2.0+build2-0ubuntu0.14.04.1","1:31.3.0+build1-0ubuntu0.14.04.1","1:31.4.0+build1-0ubuntu0.14.04.1","1:31.5.0+build1-0ubuntu0.14.04.1","1:31.6.0+build1-0ubuntu0.14.04.1","1:31.7.0+build1-0ubuntu0.14.04.1","1:31.8.0+build1-0ubuntu0.14.04.1","1:38.2.0+build1-0ubuntu0.14.04.1","1:38.3.0+build1-0ubuntu0.14.04.1","1:38.4.0+build3-0ubuntu0.14.04.1","1:38.5.1+build2-0ubuntu0.14.04.1","1:38.6.0+build1-0ubuntu0.14.04.1","1:38.7.2+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"thunderbird","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-globalmenu","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-testsuite","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:38.8.0+build1-0ubuntu0.14.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2973-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1938"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1978"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1979"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-2805"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-2807"}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"thunderbird","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:38.8.0+build1-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:38.8.0+build1-0ubuntu0.16.04.1"}]}],"versions":["1:38.3.0+build1-0ubuntu2","1:38.5.1+build2-0ubuntu1","1:38.6.0+build1-0ubuntu1","1:38.7.2+build1-0ubuntu0.16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"thunderbird","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-globalmenu","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-testsuite","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:38.8.0+build1-0ubuntu0.16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2973-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1938"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1978"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-1979"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-2805"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-2807"}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.5"}