vendor:
Thunderbird
by:
X41 D-SEC GmbH, Luis Merino
9.8
CVSS
CRITICAL
Stack-based buffer overflow
121
CWE
Product Name: Thunderbird
Affected Version From: All versions affected
Affected Version To: Thunderbird ESR 60.7.XXX
Patch Exists: YES
Related CWE: CVE-2019-11705
CPE: a:mozilla:thunderbird
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11703/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11706/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11704/, https://www.rapid7.com/db/vulnerabilities/mozilla-thunderbird-cve-2019-11705/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2019-11705/
Other Scripts:
N/A
Platforms Tested: Windows, Linux, Mac
2019
Stack-based buffer overflow in Thunderbird
A stack-based buffer overflow has been identified in the Thunderbird email client. The issue is present in the libical implementation, which was forked from upstream libical version 0.47. The issue can be triggered remotely, when an attacker sends an specially crafted calendar attachment and does not require user interaction. It might be used by a remote attacker to crash or gain remote code execution in the client system.
Mitigation:
Update to Thunderbird ESR 60.7.XXX or later.