Out-of-bounds Read Affecting thunderbird package, versions <1:68.2.1-1
Threat Intelligence
EPSS
0.46% (76th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN12-THUNDERBIRD-1560636
- published 4 Sep 2019
- disclosed 4 Sep 2019
How to fix?
Upgrade Debian:12
thunderbird
to version 1:68.2.1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream thunderbird
package and not the thunderbird
package as distributed by Debian
.
See How to fix?
for Debian:12
relevant fixed versions and status.
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
- https://security-tracker.debian.org/tracker/CVE-2019-15903
- https://seclists.org/bugtraq/2019/Dec/17
- https://seclists.org/bugtraq/2019/Dec/21
- https://seclists.org/bugtraq/2019/Dec/23
- https://seclists.org/bugtraq/2019/Nov/1
- https://seclists.org/bugtraq/2019/Nov/24
- https://seclists.org/bugtraq/2019/Oct/29
- https://seclists.org/bugtraq/2019/Sep/37
- https://seclists.org/bugtraq/2019/Sep/30
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210795
- https://www.tenable.com/security/tns-2021-11
- https://www.debian.org/security/2019/dsa-4530
- https://www.debian.org/security/2019/dsa-4549
- https://www.debian.org/security/2019/dsa-4571
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
- http://seclists.org/fulldisclosure/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- http://seclists.org/fulldisclosure/2019/Dec/27
- http://seclists.org/fulldisclosure/2019/Dec/30
- https://security.gentoo.org/glsa/201911-08
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/pull/318
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://access.redhat.com/errata/RHSA-2019:3210
- https://access.redhat.com/errata/RHSA-2019:3237
- https://access.redhat.com/errata/RHSA-2019:3756
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://usn.ubuntu.com/4165-1/
- https://usn.ubuntu.com/4202-1/
- https://usn.ubuntu.com/4335-1/
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-15903
- https://usn.ubuntu.com/4132-1/
- https://usn.ubuntu.com/4132-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
CVSS Scores
version 3.1