{"id":"USN-3165-1","summary":"thunderbird vulnerabilities","details":"Multiple memory safety issues were discovered in Thunderbird. If a user were\ntricked in to opening a specially crafted message, an attacker could\npotentially exploit these to cause a denial of service via application\ncrash, or execute arbitrary code. (CVE-2016-9893, CVE-2017-5373)\n\nAndrew Krasichkov discovered that event handlers on \u003cmarquee\u003e elements\nwere executed despite a Content Security Policy (CSP) that disallowed\ninline JavaScript. If a user were tricked in to opening a specially\ncrafted website in a browsing context, an attacker could potentially\nexploit this to conduct cross-site scripting (XSS) attacks.\n(CVE-2016-9895)\n\nA memory corruption issue was discovered in WebGL in some circumstances.\nIf a user were tricked in to opening a specially crafted website in a\nbrowsing context, an attacker could potentially exploit this to cause a\ndenial of service via application crash, or execute arbitrary code.\n(CVE-2016-9897)\n\nA use-after-free was discovered when manipulating DOM subtrees in the\nEditor. If a user were tricked in to opening a specially crafted website\nin a browsing context, an attacker could potentially exploit this to\ncause a denial of service via application crash, or execute arbitrary\ncode. (CVE-2016-9898)\n\nA use-after-free was discovered when manipulating DOM events and audio\nelements. If a user were tricked in to opening a specially crafted website\nin a browsing context, an attacker could potentially exploit this to\ncause a denial of service via application crash, or execute arbitrary\ncode. (CVE-2016-9899)\n\nIt was discovered that external resources that should be blocked when\nloading SVG images can bypass security restrictions using data: URLs. An\nattacker could potentially exploit this to obtain sensitive information.\n(CVE-2016-9900)\n\nJann Horn discovered that JavaScript Map/Set were vulnerable to timing\nattacks. If a user were tricked in to opening a specially crafted website\nin a browsing context, an attacker could potentially exploit this to\nobtain sensitive information across domains. (CVE-2016-9904)\n\nA crash was discovered in EnumerateSubDocuments while adding or removing\nsub-documents. If a user were tricked in to opening a specially crafted\nwebsite in a browsing context, an attacker could potentially exploit this\nto execute arbitrary code. (CVE-2016-9905)\n\nJIT code allocation can allow a bypass of ASLR protections in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite in a browsing context, an attacker could potentially exploit this\nto cause a denial of service via application crash, or execute arbitrary\ncode. (CVE-2017-5375)\n\nNicolas Grégoire discovered a use-after-free when manipulating XSL in\nXSLT documents in some circumstances. If a user were tricked in to opening\na specially crafted website in a browsing context, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash, or execute arbitrary code. (CVE-2017-5376)\n\nJann Horn discovered that an object's address could be discovered through\nhashed codes of JavaScript objects shared between pages. If a user were\ntricked in to opening a specially crafted website in a browsing context,\nan attacker could potentially exploit this to obtain sensitive\ninformation. (CVE-2017-5378)\n\nA use-after-free was discovered during DOM manipulation of SVG content in\nsome circumstances. If a user were tricked in to opening a specially\ncrafted website in a browsing context, an attacker could potentially\nexploit this to cause a denial of service via application crash, or\nexecute arbitrary code. (CVE-2017-5380)\n\nArmin Razmjou discovered that certain unicode glyphs do not trigger\npunycode display. If a user were tricked in to opening a specially crafted\nwebsite in a browsing context, an attacker could potentially exploit this\nto spoof the URL bar contents. (CVE-2017-5383)\n\nJerri Rice discovered insecure communication methods in the Dev Tools JSON\nViewer. An attacker could potentially exploit this to gain additional\nprivileges. (CVE-2017-5390)\n\nFilipe Gomes discovered a use-after-free in the media decoder in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite in a browsing context, an attacker could potentially exploit this\nto cause a denial of service via application crash, or execute arbitrary\ncode. (CVE-2017-5396)\n","modified":"2026-02-10T04:41:04Z","published":"2017-01-28T00:09:39Z","related":["UBUNTU-CVE-2016-9893","UBUNTU-CVE-2016-9895","UBUNTU-CVE-2016-9897","UBUNTU-CVE-2016-9898","UBUNTU-CVE-2016-9899","UBUNTU-CVE-2016-9900","UBUNTU-CVE-2016-9904","UBUNTU-CVE-2016-9905","UBUNTU-CVE-2017-5373","UBUNTU-CVE-2017-5375","UBUNTU-CVE-2017-5376","UBUNTU-CVE-2017-5378","UBUNTU-CVE-2017-5380","UBUNTU-CVE-2017-5383","UBUNTU-CVE-2017-5390","UBUNTU-CVE-2017-5396"],"upstream":["CVE-2016-9893","CVE-2016-9895","CVE-2016-9897","CVE-2016-9898","CVE-2016-9899","CVE-2016-9900","CVE-2016-9904","CVE-2016-9905","CVE-2017-5373","CVE-2017-5375","CVE-2017-5376","CVE-2017-5378","CVE-2017-5380","CVE-2017-5383","CVE-2017-5390","CVE-2017-5396","UBUNTU-CVE-2016-9893","UBUNTU-CVE-2016-9895","UBUNTU-CVE-2016-9897","UBUNTU-CVE-2016-9898","UBUNTU-CVE-2016-9899","UBUNTU-CVE-2016-9900","UBUNTU-CVE-2016-9904","UBUNTU-CVE-2016-9905","UBUNTU-CVE-2017-5373","UBUNTU-CVE-2017-5375","UBUNTU-CVE-2017-5376","UBUNTU-CVE-2017-5378","UBUNTU-CVE-2017-5380","UBUNTU-CVE-2017-5383","UBUNTU-CVE-2017-5390","UBUNTU-CVE-2017-5396"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3165-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9893"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9895"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9897"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9898"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9899"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9900"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9904"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9905"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5373"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5375"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5376"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5378"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5380"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5383"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5390"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5396"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:45.7.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:45.7.0+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1","1:31.0+build1-0ubuntu0.14.04.1","1:31.1.1+build1-0ubuntu0.14.04.1","1:31.1.2+build1-0ubuntu0.14.04.1","1:31.2.0+build2-0ubuntu0.14.04.1","1:31.3.0+build1-0ubuntu0.14.04.1","1:31.4.0+build1-0ubuntu0.14.04.1","1:31.5.0+build1-0ubuntu0.14.04.1","1:31.6.0+build1-0ubuntu0.14.04.1","1:31.7.0+build1-0ubuntu0.14.04.1","1:31.8.0+build1-0ubuntu0.14.04.1","1:38.2.0+build1-0ubuntu0.14.04.1","1:38.3.0+build1-0ubuntu0.14.04.1","1:38.4.0+build3-0ubuntu0.14.04.1","1:38.5.1+build2-0ubuntu0.14.04.1","1:38.6.0+build1-0ubuntu0.14.04.1","1:38.7.2+build1-0ubuntu0.14.04.1","1:38.8.0+build1-0ubuntu0.14.04.1","1:45.2.0+build1-0ubuntu0.14.04.3","1:45.3.0+build1-0ubuntu0.14.04.4","1:45.4.0+build1-0ubuntu0.14.04.1","1:45.5.1+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-dev"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:45.7.0+build1-0ubuntu0.14.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3165-1.json","cves_map":{"cves":[{"id":"CVE-2016-9893","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9895","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9897","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9898","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9899","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9900","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9904","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9905","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5373","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5375","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5376","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5378","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5380","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5383","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5390","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5396","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"thunderbird","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:45.7.0+build1-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:45.7.0+build1-0ubuntu0.16.04.1"}]}],"versions":["1:38.3.0+build1-0ubuntu2","1:38.5.1+build2-0ubuntu1","1:38.6.0+build1-0ubuntu1","1:38.7.2+build1-0ubuntu0.16.04.1","1:38.8.0+build1-0ubuntu0.16.04.1","1:45.2.0+build1-0ubuntu0.16.04.1","1:45.3.0+build1-0ubuntu0.16.04.2","1:45.4.0+build1-0ubuntu0.16.04.1","1:45.5.1+build1-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"thunderbird"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-dev"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-globalmenu"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"thunderbird-testsuite"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:45.7.0+build1-0ubuntu0.16.04.1","binary_name":"xul-ext-lightning"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3165-1.json","cves_map":{"cves":[{"id":"CVE-2016-9893","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9895","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9897","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9898","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9899","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9900","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9904","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-9905","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5373","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5375","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5376","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5378","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5380","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5383","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5390","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-5396","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}