SCIENTIFIC-LINUX-ERRATA Archives

June 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Patrick Riehecky <[log in to unmask]>
Reply To:
Date:
Thu, 7 Jun 2012 09:42:02 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (61 lines)
Synopsis:    Critical: thunderbird security update
Issue Date:  2012-06-06
CVE Numbers: CVE-2011-3101
             CVE-2012-1944
             CVE-2012-1945
             CVE-2012-1946
             CVE-2012-1940


Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2011-3101,
CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941,
CVE-2012-1946, CVE-2012-1947)

Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers
with graphics cards that have hardware acceleration enabled.

It was found that the Content Security Policy (CSP) implementation in
Thunderbird no longer blocked Thunderbird inline event handlers. Malicious
content could possibly bypass intended restrictions if that content relied
on CSP to protect against flaws such as cross-site scripting (XSS).
(CVE-2012-1944)

If a web server hosted content that is stored on a Microsoft Windows share,
or a Samba share, loading such content with Thunderbird could result in
Windows shortcut files (.lnk) in the same share also being loaded. An
attacker could use this flaw to view the contents of local files and
directories on the victim's system. This issue also affected users opening
content from Microsoft Windows shares, or Samba shares, that are mounted
on their systems. (CVE-2012-1945)

Note: None of the issues in this advisory can be exploited by a
specially-crafted HTML mail message as JavaScript is disabled by default
for mail messages. They could be exploited another way in Thunderbird, for
example, when viewing the full remote content of an RSS feed.

All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 10.0.5 ESR, which corrects these issues. After
installing the update, Thunderbird must be restarted for the changes to
take effect.

SL5:
  i386
     thunderbird-10.0.5-2.el5_8.i386.rpm
     thunderbird-debuginfo-10.0.5-2.el5_8.i386.rpm
  x86_64
     thunderbird-10.0.5-2.el5_8.x86_64.rpm
     thunderbird-debuginfo-10.0.5-2.el5_8.x86_64.rpm
SL6:
  i386
     thunderbird-10.0.5-2.el6_2.i686.rpm
     thunderbird-debuginfo-10.0.5-2.el6_2.i686.rpm
  x86_64
     thunderbird-10.0.5-2.el6_2.x86_64.rpm
     thunderbird-debuginfo-10.0.5-2.el6_2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2