Alert GCSA-21085 - Aggiornamento di sicurezza per Mozilla Firefox e Thunderbird

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1





******************************************************************

alert ID: GCSA-21085
data: 11 agosto 2021
titolo: Aggiornamento di sicurezza per Mozilla Firefox, Firefoz ESR e Thunderbird

******************************************************************

:: Descrizione del problema

Mozilla ha rilasciato nuove versioni del browser Firefox, Firefox ESR
e del client di posta Thunderbird con le quali risolve
varie vulnerabilita', alcune di livello critico.

Maggiori informazioni sono disponibili alla sezione "Riferimenti".


:: Software interessato

Firefox versioni precedenti alla 91
Firefox ESR versioni precedenti alla 78.13
Thunderbird versioni precedenti alla 78.13


:: Impatto

Esecuzione remota di codice arbitrario (RCE)
Accesso a dati riservati (ID)
Bypass delle funzionalita' di sicurezza (SFB)


:: Soluzioni

Aggiornare Firefox alle ultime versioni
Firefox 91
Firefox ESR 78.13

https://www.mozilla.org/it/firefox/new/
https://www.mozilla.org/en-US/firefox/all/#product-desktop-release
https://www.mozilla.org/en-US/firefox/organizations/
https://support.mozilla.org/en-US/kb/update-firefox-latest-release

Aggiornare Thunderbird all'ultima versione
Thunderbird 78.13

https://support.mozilla.org/it/kb/aggiornamento-di-thunderbird
https://www.mozilla.org/it/thunderbird/
https://www.thunderbird.net/en-US/thunderbird/all/


:: Riferimenti

Mozilla Foundation Security Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2021-33/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-34/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-35/

US-CERT
https://us-cert.cisa.gov/ncas/current-activity/2021/08/10/mozilla-releases-security-updates-firefox

Center of Internet Security
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2021-101/

Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29990





GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert







-----BEGIN PGP SIGNATURE-----

iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCYRN7eQAKCRDBnEyTZRJg
QmIjAJ47uLni7+T3heACzpeJRFlJEY7zHQCgzMgyIW7O0OvBqQT9V95aTVL206I=
=NaLc
-----END PGP SIGNATURE-----