Lucene search

K
centosCentOS ProjectCESA-2008:0224
HistoryMay 01, 2008 - 10:31 p.m.

thunderbird security update

2008-05-0122:31:15
CentOS Project
lists.centos.org
45

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.047 Low

EPSS

Percentile

92.5%

CentOS Errata and Security Advisory CESA-2008:0224

Mozilla Thunderbird is a standalone mail and newsgroup client.

A flaw was found in the processing of malformed JavaScript content. An HTML
mail message containing such malicious content could cause Thunderbird to
crash or, potentially, execute arbitrary code as the user running
Thunderbird. (CVE-2008-1380)

Note: JavaScript support is disabled by default in Thunderbird; the above
issue is not exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to these updated packages, which
contain backported patches to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-May/077040.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077041.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077044.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077045.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077054.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077058.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0224

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.047 Low

EPSS

Percentile

92.5%