CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
99.8%
CentOS Errata and Security Advisory CESA-2010:0812
Mozilla Thunderbird is a standalone mail and newsgroup client.
A race condition flaw was found in the way Thunderbird handled Document
Object Model (DOM) element properties. An HTML mail message containing
malicious content could cause Thunderbird to crash or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2010-3765)
Note: JavaScript support is disabled by default in Thunderbird. The
CVE-2010-3765 issue is not exploitable unless JavaScript is enabled.
All Thunderbird users should upgrade to this updated package, which
resolves this issue. All running instances of Thunderbird must be restarted
for the update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-November/079295.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079296.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079299.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079300.html
Affected packages:
thunderbird
Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0812
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 4 | i386 | thunderbird | <Β 1.5.0.12-33.el4.centos | thunderbird-1.5.0.12-33.el4.centos.i386.rpm |
CentOS | 4 | x86_64 | thunderbird | <Β 1.5.0.12-33.el4.centos | thunderbird-1.5.0.12-33.el4.centos.x86_64.rpm |
CentOS | 5 | i386 | thunderbird | <Β 2.0.0.24-10.el5.centos | thunderbird-2.0.0.24-10.el5.centos.i386.rpm |
CentOS | 5 | x86_64 | thunderbird | <Β 2.0.0.24-10.el5.centos | thunderbird-2.0.0.24-10.el5.centos.x86_64.rpm |