Lucene search

K
openvasCopyright (c) 2012 Greenbone Networks GmbHOPENVAS:841059
HistoryJun 28, 2012 - 12:00 a.m.

Ubuntu Update for thunderbird USN-1463-6

2012-06-2800:00:00
Copyright (c) 2012 Greenbone Networks GmbH
plugins.openvas.org
12

0.14 Low

EPSS

Percentile

95.1%

Ubuntu Update for Linux kernel vulnerabilities USN-1463-6

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ubuntu_USN_1463_6.nasl 7960 2017-12-01 06:58:16Z santu $
#
# Ubuntu Update for thunderbird USN-1463-6
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

include("revisions-lib.inc");
tag_insight = "USN-1463-1 fixed vulnerabilities in Firefox. This update provides the
  corresponding fixes for Thunderbird.

  Original advisory details:

  Jesse Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew
  McCreight, Olli Pettay, Boris Zbarsky, and Brian Bondy discovered memory
  safety issues affecting Firefox. If the user were tricked into opening a
  specially crafted page, an attacker could possibly exploit these to cause a
  denial of service via application crash, or potentially execute code with
  the privileges of the user invoking Firefox. (CVE-2012-1937, CVE-2012-1938)

  It was discovered that Mozilla's WebGL implementation exposed a bug in
  certain NVIDIA graphics drivers. The impact of this issue has not been
  disclosed at this time. (CVE-2011-3101)

  Adam Barth discovered that certain inline event handlers were not being
  blocked properly by the Content Security Policy's (CSP) inline-script
  blocking feature. Web applications relying on this feature of CSP to
  protect against cross-site scripting (XSS) were not fully protected. With
  cross-site scripting vulnerabilities, if a user were tricked into viewing a
  specially crafted page, a remote attacker could exploit this to modify the
  contents, or steal confidential data, within the same domain.
  (CVE-2012-1944)

  Paul Stone discovered that a viewed HTML page hosted on a Windows or Samba
  share could load Windows shortcut files (.lnk) in the same share. These
  shortcut files could then link to arbitrary locations on the local file
  system of the individual loading the HTML page. An attacker could
  potentially use this vulnerability to show the contents of these linked
  files or directories in an iframe, resulting in information disclosure.
  (CVE-2012-1945)

  Arthur Gerkis discovered a use-after-free vulnerability while
  replacing/inserting a node in a document. If the user were tricked into
  opening a specially crafted page, an attacker could possibly exploit this
  to cause a denial of service via application crash, or potentially execute
  code with the privileges of the user invoking Firefox. (CVE-2012-1946)

  Kaspar Brand discovered a vulnerability in how the Network Security
  Services (NSS) ASN.1 decoder handles zero length items. If the user were
  tricked into opening a specially crafted page, an attacker could possibly
  exploit this to cause a denial of service via application crash.
  (CVE-2012-0441)

  Abhishek Arya discovered two buffer overflow and one use-after-free
  vulnerabilities. If the user were tricked into opening a specially crafted
  page, an attacker coul ...

  Description truncated, for more information please check the Reference URL";

tag_summary = "Ubuntu Update for Linux kernel vulnerabilities USN-1463-6";
tag_affected = "thunderbird on Ubuntu 11.04";
tag_solution = "Please Install the Updated Packages.";



if(description)
{
  script_xref(name: "URL" , value: "http://www.ubuntu.com/usn/usn-1463-6/");
  script_id(841059);
  script_version("$Revision: 7960 $");
  script_tag(name:"last_modification", value:"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $");
  script_tag(name:"creation_date", value:"2012-06-28 10:37:07 +0530 (Thu, 28 Jun 2012)");
  script_cve_id("CVE-2012-1937", "CVE-2012-1938", "CVE-2011-3101", "CVE-2012-1944",
                "CVE-2012-1945", "CVE-2012-1946", "CVE-2012-0441", "CVE-2012-1940",
                "CVE-2012-1941", "CVE-2012-1947");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_xref(name: "USN", value: "1463-6");
  script_name("Ubuntu Update for thunderbird USN-1463-6");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages");
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("pkg-lib-deb.inc");

release = get_kb_item("ssh/login/release");

res = "";
if(release == NULL){
  exit(0);
}

if(release == "UBUNTU11.04")
{

  if ((res = isdpkgvuln(pkg:"thunderbird", ver:"13.0.1+build1-0ubuntu0.11.04.1", rls:"UBUNTU11.04")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}