Lucene search

K
osvGoogleOSV:DSA-868-1
HistoryOct 20, 2005 - 12:00 a.m.

mozilla-thunderbird - several

2005-10-2000:00:00
Google
osv.dev
4

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.3%

Several security-related problems have been discovered in Mozilla and
derived programs. Some of the following problems don’t exactly apply
to Mozilla Thunderbird, even though the code is present. In order to
keep the codebase in sync with upstream it has been altered
nevertheless. The Common Vulnerabilities and Exposures project
identifies the following problems:

  • CAN-2005-2871
    Tom Ferris discovered a bug in the IDN hostname handling of
    Mozilla that allows remote attackers to cause a denial of service
    and possibly execute arbitrary code via a hostname with dashes.
  • CAN-2005-2701
    A buffer overflow allows remote attackers to execute arbitrary
    code via an XBM image file that ends in a large number of spaces
    instead of the expected end tag.
  • CAN-2005-2702
    Mats Palmgren discovered a buffer overflow in the Unicode string
    parser that allows a specially crafted Unicode sequence to
    overflow a buffer and cause arbitrary code to be executed.
  • CAN-2005-2703
    Remote attackers could spoof HTTP headers of XML HTTP requests
    via XMLHttpRequest and possibly use the client to exploit
    vulnerabilities in servers or proxies.
  • CAN-2005-2704
    Remote attackers could spoof DOM objects via an XBL control that
    implements an internal XPCOM interface.
  • CAN-2005-2705
    Georgi Guninski discovered an integer overflow in the JavaScript
    engine that might allow remote attackers to execute arbitrary
    code.
  • CAN-2005-2706
    Remote attackers could execute Javascript code with chrome
    privileges via an about: page such as about:mozilla.
  • CAN-2005-2707
    Remote attackers could spawn windows without user interface
    components such as the address and status bar that could be used
    to conduct spoofing or phishing attacks.
  • CAN-2005-2968
    Peter Zelezny discovered that shell metacharacters are not
    properly escaped when they are passed to a shell script and allow
    the execution of arbitrary commands, e.g. when a malicious URL is
    automatically copied from another program into Mozilla as default
    browser.

For the stable distribution (sarge) these problems have been fixed in
version 1.0.2-2.sarge1.0.7.

For the unstable distribution (sid) these problems have been fixed in
version 1.0.7-1.

We recommend that you upgrade your mozilla-thunderbird package.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.3%