vendor:
Thunderbird
by:
X41 D-SEC GmbH, Luis Merino
9.8
CVSS
CRITICAL
Heap-based buffer overflow
122
CWE
Product Name: Thunderbird
Affected Version From: All versions affected
Affected Version To: Thunderbird ESR 60.7.XXX
Patch Exists: YES
Related CWE: CVE-2019-11703
CPE: a:mozilla:thunderbird
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/mozilla-thunderbird-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11706/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11704/
Other Scripts:
N/A
Platforms Tested: None
2019
Heap-based buffer overflow in Thunderbird
A heap-based buffer overflow has been identified in the Thunderbird email client. The issue is present in the libical implementation, which was forked from upstream libical version 0.47. The issue can be triggered remotely, when an attacker sends an specially crafted calendar attachment and does not require user interaction. It might be used by a remote attacker to crash or gain remote code execution in the client system.
Mitigation:
The issue has been fixed in Thunderbird ESR 60.7.XXX