{"id":2035,"date":"2020-04-22T14:34:55","date_gmt":"2020-04-22T19:34:55","guid":{"rendered":"https:\/\/cert.pa\/?p=2035"},"modified":"2020-04-22T14:35:28","modified_gmt":"2020-04-22T19:35:28","slug":"csirt-panama-aviso-2020-04-22-thunderbird-multiples-vulnerabilidades-criticas-que-afectan-a-mozilla-thunderbird","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2035","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-04-22 Thunderbird: M\u00faltiples vulnerabilidades cr\u00edticas que afectan a Mozilla Thunderbird"},"content":{"rendered":"\n<p>Gravedad: Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nVulnerabilidad: CVE-2020-6819 \/ CVE-2020-6820 \/ CVE-2020-6821 \/\nCVE-2020-6822 \/ CVE-2020-6825<br>\nFecha de publicaci\u00f3n: Abril 21, 2020<br>\n\u00daltima revisi\u00f3n: Abril 21, 2020<br>\nPortal: https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-14\/<\/p>\n\n\n\n<p><strong>Sistemas Afectados:<\/strong><br> Vulnerabilidades de seguridad que afectan a todas las versiones de Mozilla Thunderbird entre la 60.0 hasta la 60.9.1 y desde la 68.0 hasta la 68.6. <\/p>\n\n\n\n<p><strong>I. Descripci\u00f3n<\/strong><br> Actualizaci\u00f3n de Mozilla Thunderbird referente a m\u00faltiples vulnerabilidades que afectan a sus productos, versiones corregidas 68.7 de Mozilla Thunderbird.<\/p>\n\n\n\n<p><strong>II. Impacto<\/strong><br> <\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong> CVE-2020-6819<\/p>\n\n\n\n<p>Debido a un error en memoria causado por una condici\u00f3n de carrera\nejecutando el destructor \u201cnsDocShell\u201d, un atacante remoto podr\u00eda crear un sitio\nweb especialmente dise\u00f1ado, enga\u00f1ar a la v\u00edctima para que lo visite y enviar el\nerror de uso de memoria luego de ser liberada, logrando la ejecuci\u00f3n de c\u00f3digo\narbitrario en el sistema y comprometi\u00e9ndole.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong> CVE-2020-6820<\/p>\n\n\n\n<p>Debido a un error en memoria causado por una condici\u00f3n de carrera al\nmanejar \u201cReadableStream\u201d, un atacante remoto podr\u00eda crear un sitio web\nespecialmente dise\u00f1ado, enga\u00f1ar a la v\u00edctima para que lo visite y enviar el\nerror de uso de memoria luego de ser liberada, logrando la ejecuci\u00f3n de c\u00f3digo arbitrario\nen el sistema y comprometi\u00e9ndole.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong> CVE-2020-6821<\/p>\n\n\n\n<p>Debido a un error en memoria al utilizar el m\u00e9todo WebGL \u201ccopyTextSubImage\u201d,\nun atacante remoto podr\u00eda enga\u00f1ar a una v\u00edctima para que acceda a un sitio especialmente\ndise\u00f1ado, enviar el error de lectura fuera de los l\u00edmites de la memoria y leer\ncontenidos de sin inicializar en el sistema afectado.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong> CVE-2020-6822<\/p>\n\n\n\n<p>Debido a un error en memoria en \u201cGMPDecodeData\u201d al procesar im\u00e1genes m\u00e1s\ngrandes que 4Gb en arquitecturas 32-bit, un atacante remoto podr\u00eda crear una\nimagen especialmente dise\u00f1ada, enga\u00f1ar a una v\u00edctima para que la abra y enviar\nel error de escritura fuera de los l\u00edmites de la memoria, logrando ejecutar\nc\u00f3digo arbitrario y permiti\u00e9ndole comprometer al sistema afectado.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong> CVE-2020-6825<\/p>\n\n\n\n<p>Debido a un error en memoria al procesar contenido HTML, un atacante\nremoto podr\u00eda enga\u00f1ar a una v\u00edctima para que acceda a un sitio especialmente\ndise\u00f1ado, enviar el error de corrupci\u00f3n de memoria y ejecutar c\u00f3digo\narbitrario, comprometiendo al sistema vulnerable.<\/p>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/strong><br><\/p>\n\n\n\n<p>Actualizar a la versi\u00f3n 68.7 de Mozilla Thunderbird, mediante su sitio\nweb (<a href=\"https:\/\/www.thunderbird.net\/en-US\/thunderbird\/releases\/\">https:\/\/www.thunderbird.net\/en-US\/thunderbird\/releases\/<\/a>)<\/p>\n\n\n\n<p><strong>Fuentes:<\/strong> <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Mozilla Oficial. Recopilado en: <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-14\/\">https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-14\/<\/a><\/li><li>Common Vulnerabilities and Exposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6819\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6819<\/a><\/li><li>Common Vulnerabilities and Exposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6820\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6820<\/a><\/li><li>Common Vulnerabilities and Exposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6821\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6821<\/a><\/li><li>Common Vulnerabilities and Exposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6822\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6822<\/a><\/li><li>Common Vulnerabilities and Exposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6825\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6825<\/a><\/li><li>CSIRT Chile. 13 de abril del 2020. Vulnerabilidades. Recopilado en: <a href=\"https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00184-01\/\">https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00184-01\/<\/a><\/li><\/ul>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br> CSIRT PANAMA<br> Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br> E-Mail: info@cert.pa<br> Phone: +507 520-CERT (2378)<br> Web: https:\/\/cert.pa<br> Twitter: @CSIRTPanama<br> Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad: Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vulnerabilidad: CVE-2020-6819 \/ CVE-2020-6820 \/ CVE-2020-6821 \/ CVE-2020-6822 \/ CVE-2020-6825 Fecha de publicaci\u00f3n: Abril 21, 2020 \u00daltima revisi\u00f3n: Abril 21, 2020 Portal: https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-14\/ Sistemas Afectados: Vulnerabilidades de seguridad que afectan a todas las&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1411,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-2035","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2035"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2035\/revisions"}],"predecessor-version":[{"id":2036,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2035\/revisions\/2036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1411"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}