Lucene search

K
centosCentOS ProjectCESA-2011:0312
HistoryMar 03, 2011 - 5:17 a.m.

thunderbird security update

2011-03-0305:17:10
CentOS Project
lists.centos.org
61

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.423 Medium

EPSS

Percentile

97.3%

CentOS Errata and Security Advisory CESA-2011:0312

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed HTML content.
Malicious HTML content could cause Thunderbird to crash or, potentially,
execute arbitrary code with the privileges of the user running Thunderbird.
(CVE-2011-0051, CVE-2011-0053)

Note: JavaScript support is disabled by default in Thunderbird. The above
issues are not exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-March/079426.html
https://lists.centos.org/pipermail/centos-announce/2011-March/079427.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:0312

OSVersionArchitecturePackageVersionFilename
CentOS4i386thunderbird< 1.5.0.12-35.el4.centosthunderbird-1.5.0.12-35.el4.centos.i386.rpm
CentOS4x86_64thunderbird< 1.5.0.12-35.el4.centosthunderbird-1.5.0.12-35.el4.centos.x86_64.rpm

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.423 Medium

EPSS

Percentile

97.3%