==================================================================== CERT-Renater Note d'Information No. 2020/VULN007 _____________________________________________________________________ DATE : 14/01/2020 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Mozilla Thunderbird versions prior to 68.4.1. ===================================================================== https://www.mozilla.org/en-US/security/advisories/mfsa2020-04/ _____________________________________________________________________ Mozilla Foundation Security Advisory 2020-04 Security Vulnerabilities fixed in Thunderbird 68.4.1 Announced January 10, 2020 Impact critical Products Thunderbird Fixed in Thunderbird 68.4.1 In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. #CVE-2019-17026: IonMonkey type confusion with StoreElementHole and FallibleStoreElement Reporter Qihoo 360 ATA Impact critical Description Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. References Bug 1607443 #CVE-2019-17015: Memory corruption in parent process during new content process initialization on Windows Reporter Thomas Imbert Impact high Description During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. Note: this issue only occurs on Windows. Other operating systems are unaffected. References Bug 1599005 #CVE-2019-17016: Bypass of @namespace CSS sanitization during pasting Reporter Michał Bentkowski Impact high Description When pasting a