Synopsis: Moderate: thunderbird security update Issue date: 2010-09-07 CVE Names: CVE-2010-2760 CVE-2010-2765 CVE-2010-2767 CVE-2010-2768 CVE-2010-3167 CVE-2010-3168 CVE-2010-3169 Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2010-3169) A buffer overflow flaw was found in Thunderbird. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2010-2765) A use-after-free flaw and several dangling pointer flaws were found in Thunderbird. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2010-2760, CVE-2010-2767, CVE-2010-3167, CVE-2010-3168) A cross-site scripting (XSS) flaw was found in Thunderbird. Remote HTML content could cause Thunderbird to execute JavaScript code with the permissions of different remote HTML content. (CVE-2010-2768) Note: JavaScript support is disabled by default in Thunderbird. None of the above issues are exploitable unless JavaScript is enabled. All running instances of Thunderbird must be restarted for the update to take effect. SL 4.x SRPMS: thunderbird-1.5.0.12-30.el4.src.rpm i386: thunderbird-1.5.0.12-30.el4.i386.rpm x86_64: thunderbird-1.5.0.12-30.el4.x86_64.rpm SL 5.x SRPMS: thunderbird-2.0.0.24-8.el5.src.rpm i386: thunderbird-2.0.0.24-8.el5.i386.rpm x86_64: thunderbird-2.0.0.24-8.el5.x86_64.rpm -Connie Sieh -Troy Dawson