Synopsis:	Moderate: thunderbird security update
Issue date:	2008-02-07
CVE Names:	CVE-2008-0412 CVE-2008-0413 CVE-2008-0415
                 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591
                 CVE-2008-0592 CVE-2008-0593

Several flaws were found in the way Thunderbird processed certain malformed
HTML mail content. A HTML mail message containing malicious content could
cause Thunderbird to crash, or potentially execute arbitrary code as the
user running Thunderbird. (CVE-2008-0412, CVE-2008-0413, CVE-2008-0415,
CVE-2008-0419)

Several flaws were found in the way Thunderbird displayed malformed HTML
mail content. A HTML mail message containing specially-crafted content
could trick a user into surrendering sensitive information. (CVE-2008-0591,
CVE-2008-0593)

A flaw was found in the way Thunderbird handles certain chrome URLs. If a
user has certain extensions installed, it could allow a malicious HTML mail
message to steal sensitive session data. Note: this flaw does not affect a
default installation of Thunderbird. (CVE-2008-0418)

Note: JavaScript support is disabled by default in Thunderbird; the above
issues are not exploitable unless JavaScript is enabled.

A flaw was found in the way Thunderbird saves certain text files. If a
remote site offers a file of type "plain/text", rather than "text/plain",
Thunderbird will not show future "text/plain" content to the user, forcing
them to save those files locally to view the content. (CVE-2008-0592)

SL 4.x

     SRPMS:
thunderbird-1.5.0.12-8.el4.src.rpm
     i386:
thunderbird-1.5.0.12-8.el4.i386.rpm
     x86_64:
thunderbird-1.5.0.12-8.el4.x86_64.rpm

SL 5.x

     SRPMS:
thunderbird-1.5.0.12-8.el5.src.rpm
     i386:
thunderbird-1.5.0.12-8.el5.i386.rpm
     x86_64:
thunderbird-1.5.0.12-8.el5.x86_64.rpm

-Connie Sieh
-Troy Dawson