Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
From VID-98F1241F-8C09-4237-AD0D-67FB4158EA7A:
Mozilla Foundation reports:
CVE-2019-11703: Heap buffer overflow in icalparser.c
A flaw in Thunderbird's implementation of iCal causes a heap
buffer overflow in parser_get_next_char when processing certain
email messages, resulting in a potentially exploitable crash.
CVE-2019-11704: Heap buffer overflow in icalvalue.c
A flaw in Thunderbird's implementation of iCal causes a heap
buffer overflow in icalmemory_strdup_and_dequote when processing
certain email messages, resulting in a potentially exploitable
crash.
CVE-2019-11705: Stack buffer overflow in icalrecur.c
A flaw in Thunderbird's implementation of iCal causes a stack
buffer overflow in icalrecur_add_bydayrules when processing
certain email messages, resulting in a potentially exploitable
crash.
CVE-2019-11706: Type confusion in icalproperty.c
A flaw in Thunderbird's implementation of iCal causes a type
confusion in icaltimezone_get_vtimezone_properties when
processing certain email messages, resulting in a crash.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center