SCIENTIFIC-LINUX-ERRATA Archives

April 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Tue, 2 Apr 2013 23:12:34 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (60 lines)
Synopsis:          Important: thunderbird security update
Issue Date:        2013-04-02
CVE Numbers:       CVE-2013-0788
                   CVE-2013-0800
                   CVE-2013-0796
                   CVE-2013-0795
                   CVE-2013-0793
--

Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2013-0788)

A flaw was found in the way Same Origin Wrappers were implemented in
Thunderbird. Malicious content could use this flaw to bypass the same-
origin policy and execute arbitrary code with the privileges of the user
running Thunderbird. (CVE-2013-0795)

A flaw was found in the embedded WebGL library in Thunderbird. Malicious
content could cause Thunderbird to crash or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird. Note:
This issue only affected systems using the Intel Mesa graphics drivers.
(CVE-2013-0796)

An out-of-bounds write flaw was found in the embedded Cairo library in
Thunderbird. Malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user
running Thunderbird. (CVE-2013-0800)

A flaw was found in the way Thunderbird handled the JavaScript history
functions. Malicious content could cause a page to be displayed that has a
baseURI pointing to a different site, allowing cross-site scripting (XSS)
and phishing attacks. (CVE-2013-0793)

Note: All issues except CVE-2013-0800 cannot be exploited by a specially-
crafted HTML mail message as JavaScript is disabled by default for mail
messages. They could be exploited another way in Thunderbird, for example,
when viewing the full remote content of an RSS feed.

After installing the update, Thunderbird must be restarted for the changes to take effect.
--

SL5
  x86_64
    thunderbird-17.0.5-1.el5_9.x86_64.rpm
    thunderbird-debuginfo-17.0.5-1.el5_9.x86_64.rpm
  i386
    thunderbird-17.0.5-1.el5_9.i386.rpm
    thunderbird-debuginfo-17.0.5-1.el5_9.i386.rpm
SL6
  x86_64
    thunderbird-17.0.5-1.el6_4.x86_64.rpm
    thunderbird-debuginfo-17.0.5-1.el6_4.x86_64.rpm
  i386
    thunderbird-17.0.5-1.el6_4.i686.rpm
    thunderbird-debuginfo-17.0.5-1.el6_4.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2