SCIENTIFIC-LINUX-ERRATA Archives

October 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Wed, 10 Oct 2012 09:36:29 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (71 lines)
Synopsis:          Critical: thunderbird security update
Issue Date:        2012-10-09
CVE Numbers:       CVE-2012-1956
                    CVE-2012-3982
                    CVE-2012-3986
                    CVE-2012-3988
                    CVE-2012-3991
                    CVE-2012-3994
                    CVE-2012-3993
                    CVE-2012-4184
                    CVE-2012-3992
                    CVE-2012-3995
                    CVE-2012-4179
                    CVE-2012-4180
                    CVE-2012-4181
                    CVE-2012-4182
                    CVE-2012-4183
                    CVE-2012-4185
                    CVE-2012-4186
                    CVE-2012-4187
                    CVE-2012-4188
                    CVE-2012-3990
--

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2012-3982,
CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,
CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,
CVE-2012-4187, CVE-2012-4188)

Two flaws in Thunderbird could allow malicious content to bypass intended
restrictions, possibly leading to information disclosure, or Thunderbird
executing arbitrary code. Note that the information disclosure issue could
possibly be combined with other flaws to achieve arbitrary code execution.
(CVE-2012-3986, CVE-2012-3991)

Multiple flaws were found in the location object implementation in
Thunderbird. Malicious content could be used to perform cross-site
scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,
CVE-2012-3992, CVE-2012-3994)

Two flaws were found in the way Chrome Object Wrappers were implemented.
Malicious content could be used to perform cross-site scripting attacks or
cause Thunderbird to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)

Note: None of the issues in this advisory can be exploited by a
specially-crafted HTML mail message as JavaScript is disabled by default
for mail messages. They could be exploited another way in Thunderbird, for
example, when viewing the full remote content of an RSS feed.

After installing the update, Thunderbird must be restarted for the 
changes to
take effect.
--

SL5
   x86_64
     thunderbird-10.0.8-1.el5_8.x86_64.rpm
   i386
     thunderbird-10.0.8-1.el5_8.i386.rpm
SL6
   x86_64
     thunderbird-10.0.8-1.el6_3.x86_64.rpm
   i386
     thunderbird-10.0.8-1.el6_3.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2