CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
93.6%
Updated thunderbird packages fix security vulnerabilities: Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird (CVE-2015-7201, CVE-2015-7205, CVE-2015-7210, CVE-2015-7212, CVE-2015-7213, CVE-2015-7222). A flaw was found in the way Thunderbird handled content using the ‘data:’ and ‘view-source:’ URIs. An attacker could use this flaw to bypass the same-origin policy and read data from cross-site URLs and local files (CVE-2015-7214).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 5 | noarch | thunderbird | < 38.5.0-1 | thunderbird-38.5.0-1.mga5 |
Mageia | 5 | noarch | thunderbird-l10n | < 38.5.0-1 | thunderbird-l10n-38.5.0-1.mga5 |
bugs.mageia.org/show_bug.cgi?id=17386
rhn.redhat.com/errata/RHSA-2015-2657.html
www.mozilla.org/en-US/security/advisories/mfsa2015-134/
www.mozilla.org/en-US/security/advisories/mfsa2015-139/
www.mozilla.org/en-US/security/advisories/mfsa2015-145/
www.mozilla.org/en-US/security/advisories/mfsa2015-146/
www.mozilla.org/en-US/security/advisories/mfsa2015-149/
www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/