VID |
14229 |
Severity |
30 |
Port |
22 |
Protocol |
TCP |
Class |
LSC |
Detailed Description |
The remote system does not apply CESA-2019:1309 which is thunderbird security update. The system which does not apply the update is affected by the following vulnerabilities :
- Memory safety bugs fixed (CVE-2019-9800)
- Cross-origin theft of images with createImageBitmap (CVE-2019-9797)
- Stealing of cross-domain images using canvas (CVE-2019-9817)
- Compartment mismatch with fetch API (CVE-2019-9819)
- Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820)
- Use-after-free in XMLHttpRequest (CVE-2019-11691)
- Use-after-free removing listeners in the event listener manager (CVE-2019-11692)
- Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693)
- Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511)
- Out of bounds read in Skia (CVE-2019-5798)
- Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698)
- use-after-free in png_image_free in png.c (CVE-2019-7317)
Note: This check solely relied on the thunderbird RPM version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://lists.centos.org/pipermail/centos-announce/2019-June/023320.html
* Platforms Affected: CentOS Linux Server (v. 7) |
Recommendation |
Update the affected packages. Launch the graphical update tool through System -> Administration -> Software Update
For a command line interface, use the following command to update the operating system: # yum update |
Related URL |
CVE-2018-18511,CVE-2019-11691,CVE-2019-11692,CVE-2019-11693,CVE-2019-11698,CVE-2019-5798,CVE-2019-7317,CVE-2019-9797,CVE-2019-9800,CVE-2019-981 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|