Out-of-bounds Read Affecting thunderbird package, versions <1:68.6.0-1
Threat Intelligence
EPSS
0.19% (58th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN12-THUNDERBIRD-1561330
- published 6 Mar 2020
- disclosed 6 Mar 2020
Introduced: 6 Mar 2020
CVE-2019-20503 Open this link in a new tabHow to fix?
Upgrade Debian:12
thunderbird
to version 1:68.6.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream thunderbird
package and not the thunderbird
package as distributed by Debian
.
See How to fix?
for Debian:12
relevant fixed versions and status.
usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
References
- https://security-tracker.debian.org/tracker/CVE-2019-20503
- https://support.apple.com/kb/HT211168
- https://support.apple.com/kb/HT211171
- https://support.apple.com/kb/HT211175
- https://support.apple.com/kb/HT211177
- https://www.debian.org/security/2020/dsa-4642
- https://www.debian.org/security/2020/dsa-4645
- https://www.debian.org/security/2020/dsa-4639
- https://lists.debian.org/debian-lts-announce/2020/03/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/
- http://seclists.org/fulldisclosure/2020/May/49
- http://seclists.org/fulldisclosure/2020/May/52
- http://seclists.org/fulldisclosure/2020/May/55
- http://seclists.org/fulldisclosure/2020/May/59
- https://security.gentoo.org/glsa/202003-02
- https://security.gentoo.org/glsa/202003-10
- https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1992
- https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
- https://crbug.com/1059349
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://lists.debian.org/debian-lts-announce/2020/03/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html
- https://access.redhat.com/errata/RHSA-2020:0815
- https://access.redhat.com/errata/RHSA-2020:0816
- https://access.redhat.com/errata/RHSA-2020:0819
- https://access.redhat.com/errata/RHSA-2020:0820
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html
- https://usn.ubuntu.com/4299-1/
- https://usn.ubuntu.com/4328-1/
- https://usn.ubuntu.com/4335-1/
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-20503
- https://lists.debian.org/debian-lts-announce/2023/07/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/
CVSS Scores
version 3.1