SCIENTIFIC-LINUX-ERRATA Archives

July 2010

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Wed, 21 Jul 2010 13:23:31 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (55 lines)
Synopsis:	Moderate: thunderbird security update
Issue date:	2010-07-20
CVE Names:	CVE-2010-0174 CVE-2010-0175 CVE-2010-0176
                   CVE-2010-0177 CVE-2010-1197 CVE-2010-1198
                   CVE-2010-1199 CVE-2010-1200 CVE-2010-1211
                   CVE-2010-1214 CVE-2010-2753 CVE-2010-2754

Several flaws were found in the processing of malformed HTML mail 
content. An HTML mail message containing malicious content could cause 
Thunderbird to crash or, potentially, execute arbitrary code with the 
privileges of the user running Thunderbird. (CVE-2010-0174, 
CVE-2010-1200, CVE-2010-1211, CVE-2010-1214, CVE-2010-2753)

An integer overflow flaw was found in the processing of malformed HTML 
mail content. An HTML mail message containing malicious content could 
cause Thunderbird to crash or, potentially, execute arbitrary code with 
the privileges of the user running Thunderbird. (CVE-2010-1199)

Several use-after-free flaws were found in Thunderbird. Viewing an HTML
mail message containing malicious content could result in Thunderbird
executing arbitrary code with the privileges of the user running
Thunderbird. (CVE-2010-0175, CVE-2010-0176, CVE-2010-0177)

A flaw was found in the way Thunderbird plug-ins interact. It was 
possible for a plug-in to reference the freed memory from a different 
plug-in, resulting in the execution of arbitrary code with the 
privileges of the user running Thunderbird. (CVE-2010-1198)

A flaw was found in the way Thunderbird handled the 
"Content-Disposition: attachment" HTTP header when the "Content-Type: 
multipart" HTTP header was also present. Loading remote HTTP content 
that allows arbitrary uploads and relies on the "Content-Disposition: 
attachment" HTTP header to prevent content from being displayed inline, 
could be used by an attacker to serve malicious content to users. 
(CVE-2010-1197)

A same-origin policy bypass flaw was found in Thunderbird. Remote HTML
content could steal private data from different remote HTML content
Thunderbird has loaded. (CVE-2010-2754)

All running instances of Thunderbird must be restarted for the update to 
take effect.

SL 5.x

     SRPMS:
thunderbird-1.5.0.12-28.el4.src.rpm
     i386:
thunderbird-2.0.0.24-6.el5.i386.rpm
     x86_64:
thunderbird-2.0.0.24-6.el5.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2