{"id":2092,"date":"2020-05-11T16:09:40","date_gmt":"2020-05-11T21:09:40","guid":{"rendered":"https:\/\/cert.pa\/?p=2092"},"modified":"2020-05-11T16:10:55","modified_gmt":"2020-05-11T21:10:55","slug":"csirt-panama-aviso-2020-05-11-thunderbird-multiples-vulnerabilidades-criticas-que-afectan-a-mozilla-thunderbird","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2092","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-05-11 Thunderbird: M\u00faltiples vulnerabilidades cr\u00edticas que afectan a Mozilla Thunderbird"},"content":{"rendered":"\n<p>Gravedad:Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vulnerabilidad: CVE-2020-6831 \/\nCVE-2020-12387 \/ CVE-2020-12392 \/ CVE-2020-12393 \/ CVE-2020-12395 \/ CVE-2020-12397<br>\nFecha de publicaci\u00f3n: Mayo 11, 2020<br>\n\u00daltima revisi\u00f3n: Mayo 11, 2020<br>\nPortal: https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-14\/<\/p>\n\n\n\n<p><strong>Sistemas Afectados:<\/strong><br>\nVulnerabilidades de seguridad que afectan a todas las versiones de Mozilla\nThunderbird entre la 60.0 hasta la 60.9.1 y desde la 68.0 hasta la 68.7. <\/p>\n\n\n\n<p><strong>I. Descripci\u00f3n<\/strong><br>\nActualizaci\u00f3n de Mozilla Thunderbird referente a m\u00faltiples vulnerabilidades que\nafectan a sus productos, versiones corregidas 68.8 de Mozilla Thunderbird.<\/p>\n\n\n\n<p><strong>II. Impacto<\/strong><\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong>&nbsp;CVE-2020-6831<\/p>\n\n\n\n<p>Debido a un error en memoria al procesar fragmentos\nSCTP en WebRTC, un atacante remoto podr\u00eda crear una p\u00e1gina web especialmente\ndise\u00f1ada para que una v\u00edctima acceda a esta, enviar el error en memoria y logre\nvulnerar al sistema del afectado, comprometi\u00e9ndole completamente.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong>&nbsp;CVE-2020-12387<\/p>\n\n\n\n<p>Debido a un error de uso de memoria luego de ser\nliberada, causado por una condici\u00f3n de carrera al ejecutar el c\u00f3digo de apagado\npara \u201cWeb Worker\u201d, un atacante podr\u00eda crear un sitio especialmente dise\u00f1ado,\npara que una v\u00edctima lo visite, enviar el error en memoria y as\u00ed logre\ncomprometer completamente al sistema afectado.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong>&nbsp;CVE-2020-12392<\/p>\n\n\n\n<p>Debido a que en las herramientas de desarrollador,\nen la pesta\u00f1a \u201cNetwork\u201d la caracter\u00edstica \u201cCopy as Curl\u201d no escapaba\ncorrectamente el m\u00e9todo HTTP de una petici\u00f3n, la cual puede ser controlada por\nel sitio, si un usuario usaba esa caracter\u00edstica y luego lo pegaba en la\nterminal, pod\u00eda resultar en la inyecci\u00f3n de comandos, y por ende, ejecuci\u00f3n\narbitraria de comandos, comprometiendo al sistema.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong>&nbsp;CVE-2020-12393<\/p>\n\n\n\n<p>Debido a que en las herramientas de desarrollador,\nen la pesta\u00f1a \u201cNetwork\u201d la caracter\u00edstica \u201cCopy as Curl\u201d no escapaba\ncorrectamente los datos de una petici\u00f3n HTTP POST, la cual puede ser controlada\npor el sitio, si un usuario usaba esa caracter\u00edstica y luego lo pegaba en la\nterminal, pod\u00eda resultar en la filtraci\u00f3n de archivos locales. Esta\nvulnerabilidad solo afecta a usuarios en Windows.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong>&nbsp;CVE-2020-12395<\/p>\n\n\n\n<p>Debido a un error en los l\u00edmites de la memoria al\nprocesar contenido HTML, un atacante remoto podr\u00eda crear una p\u00e1gina web\nespecialmente dise\u00f1ada para que una v\u00edctima acceda a esta, enviar el error en\nmemoria y logre vulnerar al sistema del afectado, comprometi\u00e9ndole\ncompletamente.<\/p>\n\n\n\n<p><strong>Vulnerabilidad:<\/strong>&nbsp;CVE-2020-12397<\/p>\n\n\n\n<p>Debido al incorrecto procesamiento de direcci\u00f3n de\ncorreo emisoras, un atacante remoto podr\u00eda suplantar la direcci\u00f3n email\nutilizando caracteres Unicode codificados y as\u00ed, enga\u00f1ar a una v\u00edctima\nhaci\u00e9ndola pensar que recibi\u00f3 un correo de otro usuario.<\/p>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e\ninformaci\u00f3n<\/strong><\/p>\n\n\n\n<p>Actualizar a la versi\u00f3n 68.8 de Mozilla\nThunderbird, mediante su sitio web (<a href=\"https:\/\/www.thunderbird.net\/en-US\/thunderbird\/releases\/\"><strong>https:\/\/www.thunderbird.net\/en-US\/thunderbird\/releases\/<\/strong><\/a>)<\/p>\n\n\n\n<p><strong>Fuentes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Mozilla      Oficial. Recopilado en:\u00a0<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-18\/\">https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-18\/<\/a><\/li><li>Common      Vulnerabilities and Exposures (CVE). Recopilado en:\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6831\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-6831<\/a><\/li><li>Common      Vulnerabilities and Exposures (CVE). Recopilado en:\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12387\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12387<\/a><\/li><li>Common      Vulnerabilities and Exposures (CVE). Recopilado en:\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12392\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12392<\/a><\/li><li>Common      Vulnerabilities and Exposures (CVE). Recopilado en:\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12393\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12393<\/a><\/li><li>Common      Vulnerabilities and Exposures (CVE). Recopilado en:\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12395\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12395<\/a><\/li><li>Common      Vulnerabilities and Exposures (CVE). Recopilado en:\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12397\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12397<\/a><\/li><li>CSIRT      Chile. 9 de mayo del 2020. Vulnerabilidades. Recopilado en:\u00a0<a href=\"https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00207-01\/\">https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00207-01\/<\/a><\/li><\/ul>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion\nGubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad:Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vulnerabilidad: CVE-2020-6831 \/ CVE-2020-12387 \/ CVE-2020-12392 \/ CVE-2020-12393 \/ CVE-2020-12395 \/ CVE-2020-12397 Fecha de publicaci\u00f3n: Mayo 11, 2020 \u00daltima revisi\u00f3n: Mayo 11, 2020 Portal: https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-14\/ Sistemas Afectados: Vulnerabilidades de seguridad que afectan a todas&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1411,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-2092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2092"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2092\/revisions"}],"predecessor-version":[{"id":2094,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2092\/revisions\/2094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1411"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}