Good morning folks,
Last week, critical security vulnerabilities were unveiled in Mozilla
Firefox and Mozilla Thunderbird [1]. These vulnerabilities allowed for
arbitrary code execution, sandbox escape, and denial of service. The
problem with these vulnerabilities is that they are being actively
exploited against users in the wild, as noted by several different
security companies. As a result, we highly recommend updating
immediately to Firefox 67.0.4 and Thunderbird-60.7.2.
In addition to the two in Firefox [2] [3], there were two sets
discovered in Thunderbird as well [4] [5] [6] [7]. Two of the
vulnerabilities pertain to the Gecko rendering engine, which contains
the security fixes from Firefox. Four of them are new 0days that were
found in the libical implementation in Thunderbird. By receiving an
email with a corrupted .ics file with a payload in it, a heap-based
buffer overflow will occur [8] [9] [10] [11] or type confusion will
occur, leading to an exploitable crash, possible arbitrary code
execution, and complete destruction of the user's Thunderbird Email
profile. This is because of the way that Thunderbird indexes email as it
receives it. When Thunderbird processes these emails, it will attempt to
index the .ics file, and in the process of opening it to read it's
contents, will crash. Upon launching Thunderbird again, it will once
again attempt to download the mail and index it, and crash repeatedly as
a result. These vulnerabilities were reported to Mozilla in 2016
(2016-06-19) and were never fixed by Mozilla even after they were fixed
in libical upstream (2016 as well). A recent development has made it so
that PoCs are available and the vulnerabilities are being exploited in
the wild.
When upgrading Thunderbird, no new package updates will be required if
you are running BLFS 8.4. I did not attempt to upgrade an 8.3, 8.2, 8.1,
or 8.0 system because I do not have them around at the moment.
Unfortunately, if you are upgrading Firefox on a stock 8.4 system, some
upgrades need to be done:
- NSS (I recommend 3.44, it's got a new root certificate installed)
- NSPR (4.21 at minimum, I recommend the latest)
- cbindgen (0.8.2 at minimum, I recommend the latest)
- SQLite (3.27.2 at minimum, 3.28 is recommended)
- Recommended but not required to fix a security flaw: Node.JS to 10.16.0
- Recommended but not required to fix a set of security flaws: wget to
1.200.3
- Recommended but not required to fix another set of security flaws:
cURL to 7.65.1
Thank you,
Douglas R. Reno
LINKS:
[1]: https://thehackernews.com/2019/06/firefox-0day-vulnerability.html
[2]: https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/
[3]: https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/
[4]: https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/
[5]: https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/
[6]: https://www.thunderbird.net/en-US/thunderbird/60.7.2/releasenotes/
[7]: https://www.thunderbird.net/en-US/thunderbird/60.7.1/releasenotes/
[8]: https://seclists.org/oss-sec/2019/q2/157
[9]: https://seclists.org/oss-sec/2019/q2/158
[10]: https://seclists.org/oss-sec/2019/q2/159
[11]: https://seclists.org/oss-sec/2019/q2/160
--
http://lists.linuxfromscratch.org/listinfo/blfs-dev
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page