Lucene search

K
ubuntuUbuntuUSN-668-1
HistoryNov 26, 2008 - 12:00 a.m.

Thunderbird vulnerabilities

2008-11-2600:00:00
ubuntu.com
35

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.836 High

EPSS

Percentile

98.4%

Releases

  • Ubuntu 8.10
  • Ubuntu 8.04
  • Ubuntu 7.10
  • Ubuntu 6.06

Packages

  • mozilla-thunderbird -
  • thunderbird -

Details

Georgi Guninski, Michal Zalewsk and Chris Evans discovered that the same-origin
check in Thunderbird could be bypassed. If a user were tricked into opening a
malicious website, an attacker could obtain private information from data
stored in the images, or discover information about software on the user’s
computer. (CVE-2008-5012)

Jesse Ruderman discovered that Thunderbird did not properly guard locks on
non-native objects. If a user had JavaScript enabled and were tricked into
opening malicious web content, an attacker could cause a browser crash and
possibly execute arbitrary code with user privileges. (CVE-2008-5014)

Several problems were discovered in the browser, layout and JavaScript engines.
If a user had JavaScript enabled, these problems could allow an attacker to
crash Thunderbird and possibly execute arbitrary code with user privileges.
(CVE-2008-5016, CVE-2008-5017, CVE-2008-5018)

A flaw was discovered in Thunderbird’s DOM constructing code. If a user were
tricked into opening a malicious website while having JavaScript enabled, an
attacker could cause the browser to crash and potentially execute arbitrary
code with user privileges. (CVE-2008-5021)

It was discovered that the same-origin check in Thunderbird could be bypassed.
If a user had JavaScript enabled and were tricked into opening malicious web
content, an attacker could execute JavaScript in the context of a different
website. (CVE-2008-5022)

Chris Evans discovered that Thunderbird did not properly parse E4X documents,
leading to quote characters in the namespace not being properly escaped.
(CVE-2008-5024)

Boris Zbarsky discovered that Thunderbird did not properly process comments in
forwarded in-line messages. If a user had JavaScript enabled and opened a
malicious email, an attacker may be able to obtain information about the
recipient.

OSVersionArchitecturePackageVersionFilename
Ubuntu8.10noarchthunderbird< 2.0.0.18+nobinonly-0ubuntu0.8.10.1UNKNOWN
Ubuntu8.10noarchthunderbird< dev-2.0.0.18+nobinonly-0ubuntu0.8.10.1UNKNOWN
Ubuntu8.10noarchthunderbird< gnome-support-2.0.0.18+nobinonly-0ubuntu0.8.10.1UNKNOWN
Ubuntu8.04noarchthunderbird< 2.0.0.18+nobinonly-0ubuntu0.8.04.1UNKNOWN
Ubuntu8.04noarchthunderbird-dev< 2.0.0.18+nobinonly-0ubuntu0.8.04.1UNKNOWN
Ubuntu8.04noarchthunderbird-gnome-support< 2.0.0.18+nobinonly-0ubuntu0.8.04.1UNKNOWN
Ubuntu7.10noarchthunderbird< 2.0.0.18+nobinonly-0ubuntu0.7.10.1UNKNOWN
Ubuntu7.10noarchthunderbird< dev-2.0.0.18+nobinonly-0ubuntu0.7.10.1UNKNOWN
Ubuntu7.10noarchthunderbird< gnome-support-2.0.0.18+nobinonly-0ubuntu0.7.10.1UNKNOWN
Ubuntu6.06noarchmozilla-thunderbird< 1.5.0.13+1.5.0.15~prepatch080614h-0ubuntu0.6.06.1UNKNOWN
Rows per page:
1-10 of 131

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.836 High

EPSS

Percentile

98.4%