Lucene search

K
ubuntuUbuntuUSN-536-1
HistoryOct 23, 2007 - 12:00 a.m.

Thunderbird vulnerabilities

2007-10-2300:00:00
ubuntu.com
39

6.8 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%

Releases

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Packages

  • mozilla-thunderbird -
  • thunderbird -

Details

Various flaws were discovered in the layout and JavaScript engines. By
tricking a user into opening a malicious web page, an attacker could
execute arbitrary code with the user’s privileges. (CVE-2007-5339,
CVE-2007-5340)

Flaws were discovered in the file upload form control. By tricking
a user into opening a malicious web page, an attacker could force
arbitrary files from the user’s computer to be uploaded without their
consent. (CVE-2006-2894, CVE-2007-3511)

Michal Zalewski discovered that the onUnload event handlers were
incorrectly able to access information outside the old page content. A
malicious web site could exploit this to modify the contents, or
steal confidential data (such as passwords), of the next loaded web
page. (CVE-2007-1095)

Stefano Di Paola discovered that Thunderbird did not correctly request
Digest Authentications. A malicious web site could exploit this to
inject arbitrary HTTP headers or perform session splitting attacks
against proxies. (CVE-2007-2292)

Eli Friedman discovered that XUL could be used to hide a window’s
titlebar. A malicious web site could exploit this to enhance their
attempts at creating phishing web sites. (CVE-2007-5334)

Georgi Guninski discovered that Thunderbird would allow file-system based
web pages to access additional files. By tricking a user into opening
a malicious web page from a gnome-vfs location, an attacker could steal
arbitrary files from the user’s computer. (CVE-2007-5337)

It was discovered that the XPCNativeWrappers were not safe in
certain situations. By tricking a user into opening a malicious web
page, an attacker could run arbitrary JavaScript with the user’s
privileges. (CVE-2007-5338)

Please note that JavaScript is disabled by default for emails, and it
is not recommended to enable it.

OSVersionArchitecturePackageVersionFilename
Ubuntu7.10noarchmozilla-thunderbird< 2.0.0.8~pre071022+nobinonly-0ubuntu0.7.10UNKNOWN
Ubuntu7.10noarchthunderbird< 2.0.0.8~pre071022+nobinonly-0ubuntu0.7.10UNKNOWN
Ubuntu7.10noarchthunderbird-dev< 2.0.0.8~pre071022+nobinonly-0ubuntu0.7.10UNKNOWN
Ubuntu7.10noarchthunderbird-gnome-support< 2.0.0.8~pre071022+nobinonly-0ubuntu0.7.10UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird< 1.5.0.13+1.5.0.14b-0ubuntu0.7.04UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird-dev< 1.5.0.13+1.5.0.14b-0ubuntu0.7.04UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird-inspector< 1.5.0.13+1.5.0.14b-0ubuntu0.7.04UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird-typeaheadfind< 1.5.0.13+1.5.0.14b-0ubuntu0.7.04UNKNOWN
Ubuntu6.10noarchmozilla-thunderbird< 1.5.0.13+1.5.0.14b-0ubuntu0.6.10UNKNOWN
Ubuntu6.10noarchmozilla-thunderbird-dev< 1.5.0.13+1.5.0.14b-0ubuntu0.6.10UNKNOWN
Rows per page:
1-10 of 161

6.8 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%