- Home
- CVEs with nessus.description==From+Red+Hat+Security+Advisory+2012%3A1089+%3A%0A%0AAn+updated+thunderbird+package+that+fixes+multiple+security+issues+is+now+available+for+Red+Hat+Enterprise+Linux+5+and+6.%0A%0AThe+Red+Hat+Security+Response+Team+has+rated+this+update+as+having+critical+security+impact.+Common+Vulnerability+Scoring+System+%28CVSS%29+base+scores%2C+which+give+detailed+severity+ratings%2C+are+available+for+each+vulnerability+from+the+CVE+links+in+the+References+section.%0A%0AMozilla+Thunderbird+is+a+standalone+mail+and+newsgroup+client.%0A%0ASeveral+flaws+were+found+in+the+processing+of+malformed+content.%0AMalicious+content+could+cause+Thunderbird+to+crash+or%2C+potentially%2C+execute+arbitrary+code+with+the+privileges+of+the+user+running+Thunderbird.+%28CVE-2012-1948%2C+CVE-2012-1951%2C+CVE-2012-1952%2C+CVE-2012-1953%2C+CVE-2012-1954%2C+CVE-2012-1958%2C+CVE-2012-1962%2C+CVE-2012-1967%29%0A%0AMalicious+content+could+bypass+same-compartment+security+wrappers+%28SCSW%29+and+execute+arbitrary+code+with+chrome+privileges.%0A%28CVE-2012-1959%29%0A%0AA+flaw+in+the+way+Thunderbird+called+history.forward+and+history.back+could+allow+an+attacker+to+conceal+a+malicious+URL%2C+possibly+tricking+a+user+into+believing+they+are+viewing+trusted+content.%0A%28CVE-2012-1955%29%0A%0AA+flaw+in+a+parser+utility+class+used+by+Thunderbird+to+parse+feeds+%28such+as+RSS%29+could+allow+an+attacker+to+execute+arbitrary+JavaScript+with+the+privileges+of+the+user+running+Thunderbird.+This+issue+could+have+affected+other+Thunderbird+components+or+add-ons+that+assume+the+class+returns+sanitized+input.+%28CVE-2012-1957%29%0A%0AA+flaw+in+the+way+Thunderbird+handled+X-Frame-Options+headers+could+allow+malicious+content+to+perform+a+clickjacking+attack.%0A%28CVE-2012-1961%29%0A%0AA+flaw+in+the+way+Content+Security+Policy+%28CSP%29+reports+were+generated+by+Thunderbird+could+allow+malicious+content+to+steal+a+victim%27s+OAuth+2.0+access+tokens+and+OpenID+credentials.+%28CVE-2012-1963%29%0A%0AA+flaw+in+the+way+Thunderbird+handled+certificate+warnings+could+allow+a+man-in-the-middle+attacker+to+create+a+crafted+warning%2C+possibly+tricking+a+user+into+accepting+an+arbitrary+certificate+as+trusted.%0A%28CVE-2012-1964%29%0A%0AThe+nss+update+RHBA-2012%3A0337+for+Red+Hat+Enterprise+Linux+5+and+6+introduced+a+mitigation+for+the+CVE-2011-3389+flaw.+For+compatibility+reasons%2C+it+remains+disabled+by+default+in+the+nss+packages.+This+update+makes+Thunderbird+enable+the+mitigation+by+default.+It+can+be+disabled+by+setting+the+NSS_SSL_CBC_RANDOM_IV+environment+variable+to+0+before+launching+Thunderbird.+%28BZ%23838879%29%0A%0ARed+Hat+would+like+to+thank+the+Mozilla+project+for+reporting+these+issues.+Upstream+acknowledges+Benoit+Jacob%2C+Jesse+Ruderman%2C+Christian+Holler%2C+Bill+McCloskey%2C+Abhishek+Arya%2C+Arthur+Gerkis%2C+Bill+Keese%2C+moz_bug_r_a4%2C+Bobby+Holley%2C+Mariusz+Mlynski%2C+Mario+Heiderich%2C+Frederic+Buclin%2C+Karthikeyan+Bhargavan%2C+and+Matt+McCutchen+as+the+original+reporters+of+these+issues.%0A%0ANote%3A+None+of+the+issues+in+this+advisory+can+be+exploited+by+a+specially+crafted+HTML+mail+message+as+JavaScript+is+disabled+by+default+for+mail+messages.+They+could+be+exploited+another+way+in+Thunderbird%2C+for+example%2C+when+viewing+the+full+remote+content+of+an+RSS+feed.%0A%0AAll+Thunderbird+users+should+upgrade+to+this+updated+package%2C+which+contains+Thunderbird+version+10.0.6+ESR%2C+which+corrects+these+issues.%0AAfter+installing+the+update%2C+Thunderbird+must+be+restarted+for+the+changes+to+take+effect
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top