Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.883305
Categoría:CentOS Local Security Checks
Título:CentOS: Security Advisory for thunderbird (CESA-2020:5235)
Resumen:The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2020:5235 advisory.
Descripción:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the CESA-2020:5235 advisory.

Vulnerability Insight:
Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.5.0.

Security Fix(es):

* Mozilla: Parsing mismatches could confuse and bypass security sanitizer
for chrome privileged code (CVE-2020-26951)

* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
(CVE-2020-26968)

* Mozilla: Variable time processing of cross-origin images during drawImage
calls (CVE-2020-16012)

* Mozilla: Fullscreen could be enabled without displaying the security UI
(CVE-2020-26953)

* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956)

* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type
restrictions (CVE-2020-26958)

* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959)

* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960)

* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961)

* Mozilla: Software keyboards may have remembered typed passwords
(CVE-2020-26965)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'thunderbird' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2020-16012
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
https://crbug.com/1088224
Common Vulnerability Exposure (CVE) ID: CVE-2020-26951
https://www.mozilla.org/security/advisories/mfsa2020-50/
https://www.mozilla.org/security/advisories/mfsa2020-51/
https://www.mozilla.org/security/advisories/mfsa2020-52/
https://bugzilla.mozilla.org/show_bug.cgi?id=1667113
Common Vulnerability Exposure (CVE) ID: CVE-2020-26953
https://bugzilla.mozilla.org/show_bug.cgi?id=1656741
Common Vulnerability Exposure (CVE) ID: CVE-2020-26956
https://bugzilla.mozilla.org/show_bug.cgi?id=1666300
Common Vulnerability Exposure (CVE) ID: CVE-2020-26958
https://bugzilla.mozilla.org/show_bug.cgi?id=1669355
Common Vulnerability Exposure (CVE) ID: CVE-2020-26959
https://bugzilla.mozilla.org/show_bug.cgi?id=1669466
Common Vulnerability Exposure (CVE) ID: CVE-2020-26960
https://bugzilla.mozilla.org/show_bug.cgi?id=1670358
Common Vulnerability Exposure (CVE) ID: CVE-2020-26961
https://bugzilla.mozilla.org/show_bug.cgi?id=1672528
Common Vulnerability Exposure (CVE) ID: CVE-2020-26965
https://bugzilla.mozilla.org/show_bug.cgi?id=1661617
Common Vulnerability Exposure (CVE) ID: CVE-2020-26968
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1551615%2C1607762%2C1656697%2C1657739%2C1660236%2C1667912%2C1671479%2C1671923
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.