Synopsis: Moderate: thunderbird security update Issue date: 2008-02-07 CVE Names: CVE-2008-0412 CVE-2008-0413 CVE-2008-0415 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591 CVE-2008-0592 CVE-2008-0593 Several flaws were found in the way Thunderbird processed certain malformed HTML mail content. A HTML mail message containing malicious content could cause Thunderbird to crash, or potentially execute arbitrary code as the user running Thunderbird. (CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0419) Several flaws were found in the way Thunderbird displayed malformed HTML mail content. A HTML mail message containing specially-crafted content could trick a user into surrendering sensitive information. (CVE-2008-0591, CVE-2008-0593) A flaw was found in the way Thunderbird handles certain chrome URLs. If a user has certain extensions installed, it could allow a malicious HTML mail message to steal sensitive session data. Note: this flaw does not affect a default installation of Thunderbird. (CVE-2008-0418) Note: JavaScript support is disabled by default in Thunderbird; the above issues are not exploitable unless JavaScript is enabled. A flaw was found in the way Thunderbird saves certain text files. If a remote site offers a file of type "plain/text", rather than "text/plain", Thunderbird will not show future "text/plain" content to the user, forcing them to save those files locally to view the content. (CVE-2008-0592) SL 4.x SRPMS: thunderbird-1.5.0.12-8.el4.src.rpm i386: thunderbird-1.5.0.12-8.el4.i386.rpm x86_64: thunderbird-1.5.0.12-8.el4.x86_64.rpm SL 5.x SRPMS: thunderbird-1.5.0.12-8.el5.src.rpm i386: thunderbird-1.5.0.12-8.el5.i386.rpm x86_64: thunderbird-1.5.0.12-8.el5.x86_64.rpm -Connie Sieh -Troy Dawson