Lucene search

K
centosCentOS ProjectCESA-2010:0812
HistoryNov 01, 2010 - 9:24 p.m.

thunderbird security update

2010-11-0121:24:26
CentOS Project
lists.centos.org
62

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.7%

CentOS Errata and Security Advisory CESA-2010:0812

Mozilla Thunderbird is a standalone mail and newsgroup client.

A race condition flaw was found in the way Thunderbird handled Document
Object Model (DOM) element properties. An HTML mail message containing
malicious content could cause Thunderbird to crash or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2010-3765)

Note: JavaScript support is disabled by default in Thunderbird. The
CVE-2010-3765 issue is not exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to this updated package, which
resolves this issue. All running instances of Thunderbird must be restarted
for the update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-November/079295.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079296.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079299.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079300.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0812

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.7%