Lucene search

K
ubuntuUbuntuUSN-647-1
HistorySep 26, 2008 - 12:00 a.m.

Thunderbird vulnerabilities

2008-09-2600:00:00
ubuntu.com
42

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.963 High

EPSS

Percentile

99.5%

Releases

  • Ubuntu 8.04
  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.06

Packages

  • mozilla-thunderbird -
  • thunderbird -

Details

It was discovered that the same-origin check in Thunderbird could
be bypassed. If a user had JavaScript enabled and were tricked into
opening a malicious website, an attacker may be able to execute
JavaScript in the context of a different website. (CVE-2008-3835)

Several problems were discovered in the browser engine of
Thunderbird. If a user had JavaScript enabled, this could allow an
attacker to execute code with chrome privileges. (CVE-2008-4058,
CVE-2008-4059, CVE-2008-4060)

Drew Yao, David Maciejak and other Mozilla developers found several
problems in the browser engine of Thunderbird. If a user had
JavaScript enabled and were tricked into opening a malicious web
page, an attacker could cause a denial of service or possibly
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064)

Dave Reed discovered a flaw in the JavaScript parsing code when
processing certain BOM characters. An attacker could exploit this
to bypass script filters and perform cross-site scripting attacks
if a user had JavaScript enabled. (CVE-2008-4065)

Gareth Heyes discovered a flaw in the HTML parser of Thunderbird. If
a user had JavaScript enabled and were tricked into opening a
malicious web page, an attacker could bypass script filtering and
perform cross-site scripting attacks. (CVE-2008-4066)

Boris Zbarsky and Georgi Guninski independently discovered flaws in
the resource: protocol. An attacker could exploit this to perform
directory traversal, read information about the system, and prompt
the user to save information in a file. (CVE-2008-4067,
CVE-2008-4068)

Georgi Guninski discovered that Thunderbird improperly handled
cancelled newsgroup messages. If a user opened a crafted newsgroup
message, an attacker could cause a buffer overrun and potentially
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-4070)

OSVersionArchitecturePackageVersionFilename
Ubuntu8.04noarchthunderbird< 2.0.0.17+nobinonly-0ubuntu0.8.04.1UNKNOWN
Ubuntu8.04noarchthunderbird-dev< 2.0.0.17+nobinonly-0ubuntu0.8.04.1UNKNOWN
Ubuntu8.04noarchthunderbird-gnome-support< 2.0.0.17+nobinonly-0ubuntu0.8.04.1UNKNOWN
Ubuntu7.10noarchthunderbird< 2.0.0.17+nobinonly-0ubuntu0.7.10.1UNKNOWN
Ubuntu7.10noarchthunderbird-dev< 2.0.0.17+nobinonly-0ubuntu0.7.10.1UNKNOWN
Ubuntu7.10noarchthunderbird-gnome-support< 2.0.0.17+nobinonly-0ubuntu0.7.10.1UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird< 1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird-dev< 1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird-inspector< 1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1UNKNOWN
Ubuntu7.04noarchmozilla-thunderbird-typeaheadfind< 1.5.0.13+1.5.0.15~prepatch080614g-0ubuntu0.7.04.1UNKNOWN
Rows per page:
1-10 of 141

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.963 High

EPSS

Percentile

99.5%