![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.884191 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS: Security Advisory for thunderbird (CESA-2022:0127) |
Resumen: | The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2022:0127 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'thunderbird' package(s) announced via the CESA-2022:0127 advisory. Vulnerability Insight: Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.5.0. Security Fix(es): * Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) * Mozilla: Race condition when playing audio files (CVE-2022-22737) * Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) * Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) * Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) * Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) * Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) * Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) * Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) * Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Affected Software/OS: 'thunderbird' package(s) on CentOS 7. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-4140 https://bugzilla.mozilla.org/show_bug.cgi?id=1746720 https://www.mozilla.org/security/advisories/mfsa2022-01/ https://www.mozilla.org/security/advisories/mfsa2022-02/ https://www.mozilla.org/security/advisories/mfsa2022-03/ Common Vulnerability Exposure (CVE) ID: CVE-2022-22737 https://bugzilla.mozilla.org/show_bug.cgi?id=1745874 Common Vulnerability Exposure (CVE) ID: CVE-2022-22738 https://bugzilla.mozilla.org/show_bug.cgi?id=1742382 Common Vulnerability Exposure (CVE) ID: CVE-2022-22739 https://bugzilla.mozilla.org/show_bug.cgi?id=1744158 Common Vulnerability Exposure (CVE) ID: CVE-2022-22740 https://bugzilla.mozilla.org/show_bug.cgi?id=1742334 Common Vulnerability Exposure (CVE) ID: CVE-2022-22741 https://bugzilla.mozilla.org/show_bug.cgi?id=1740389 Common Vulnerability Exposure (CVE) ID: CVE-2022-22742 https://bugzilla.mozilla.org/show_bug.cgi?id=1739923 Common Vulnerability Exposure (CVE) ID: CVE-2022-22743 https://bugzilla.mozilla.org/show_bug.cgi?id=1739220 Common Vulnerability Exposure (CVE) ID: CVE-2022-22745 https://bugzilla.mozilla.org/show_bug.cgi?id=1735856 Common Vulnerability Exposure (CVE) ID: CVE-2022-22747 https://bugzilla.mozilla.org/show_bug.cgi?id=1735028 Common Vulnerability Exposure (CVE) ID: CVE-2022-22748 https://bugzilla.mozilla.org/show_bug.cgi?id=1705211 Common Vulnerability Exposure (CVE) ID: CVE-2022-22751 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011 |
Copyright | Copyright (C) 2022 Greenbone Networks GmbH |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |