Lucene search

K
centosCentOS ProjectCESA-2008:0209
HistoryApr 10, 2008 - 5:03 p.m.

thunderbird security update

2008-04-1017:03:24
CentOS Project
lists.centos.org
64

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.428 Medium

EPSS

Percentile

97.3%

CentOS Errata and Security Advisory CESA-2008:0209

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of some malformed HTML mail
content. An HTML mail message containing such malicious content could cause
Thunderbird to crash or, potentially, execute arbitrary code as the user
running Thunderbird. (CVE-2008-1233, CVE-2008-1235, CVE-2008-1236,
CVE-2008-1237)

Several flaws were found in the display of malformed web content. An HTML
mail message containing specially-crafted content could, potentially, trick
a user into surrendering sensitive information. (CVE-2008-1234,
CVE-2008-1238, CVE-2008-1241)

Note: JavaScript support is disabled by default in Thunderbird; the above
issues are not exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to these updated packages, which
contain backported patches to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-April/076969.html
https://lists.centos.org/pipermail/centos-announce/2008-April/076970.html
https://lists.centos.org/pipermail/centos-announce/2008-April/076978.html
https://lists.centos.org/pipermail/centos-announce/2008-April/076979.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0209

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.428 Medium

EPSS

Percentile

97.3%