[manjaro-security] [arch-security] [ASA-201612-2] thunderbird: arbitrary code execution
Santiago Torres-Arias
santiago at archlinux.org
Thu Dec 1 20:22:51 CET 2016
Arch Linux Security Advisory ASA-201612-2
=========================================
Severity: Critical
Date : 2016-12-01
CVE-ID : CVE-2016-9079
Package : thunderbird
Type : arbitrary code execution
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package thunderbird before version 45.5.1-1 is vulnerable to
arbitrary code execution.
Resolution
==========
Upgrade to 45.5.1-1.
# pacman -Syu "thunderbird>=45.5.1-1"
The problem has been fixed upstream in version 45.5.1.
Workaround
==========
None
Description
===========
A use-after-free vulnerability has been discovered in the SVG Animation
component of Firefox, leading to arbitrary code execution.
Impact
======
A remote attacker is able to execute arbitrary code by embedding a
crafted SVG image in content displayed by Thunderbird.
References
==========
https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird45.5.1
https://www.mozilla.org/en-US/security/advisories/mfsa2016-92/
https://access.redhat.com/security/cve/CVE-2016-9079
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20161201/7bb533de/attachment.pgp>
More information about the manjaro-security
mailing list