Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.884225
Categoría:CentOS Local Security Checks
Título:CentOS: Security Advisory for thunderbird (CESA-2022:5480)
Resumen:The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2022:5480 advisory.
Descripción:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the CESA-2022:5480 advisory.

Vulnerability Insight:
Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 91.11.

Security Fix(es):

* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via
retargeted javascript: URI (CVE-2022-34468)

* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470)

* Mozilla: A popup window could be resized in a way to overlay the address
bar with web content (CVE-2022-34479)

* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
(CVE-2022-34484)

* Mozilla: Undesired attributes could be set as part of prototype pollution
(CVE-2022-2200)

* Mozilla: An email with a mismatching OpenPGP signature date was accepted
as valid (CVE-2022-2226)

* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744)

* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked
(CVE-2022-34472)

* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'thunderbird' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-2200
https://bugzilla.mozilla.org/show_bug.cgi?id=1771381
https://www.mozilla.org/security/advisories/mfsa2022-24/
https://www.mozilla.org/security/advisories/mfsa2022-25/
https://www.mozilla.org/security/advisories/mfsa2022-26/
Common Vulnerability Exposure (CVE) ID: CVE-2022-2226
https://bugzilla.mozilla.org/show_bug.cgi?id=1775441
Common Vulnerability Exposure (CVE) ID: CVE-2022-31744
https://bugzilla.mozilla.org/show_bug.cgi?id=1757604
https://www.mozilla.org/security/advisories/mfsa2022-20/
Common Vulnerability Exposure (CVE) ID: CVE-2022-34468
https://bugzilla.mozilla.org/show_bug.cgi?id=1768537
Common Vulnerability Exposure (CVE) ID: CVE-2022-34470
https://bugzilla.mozilla.org/show_bug.cgi?id=1765951
Common Vulnerability Exposure (CVE) ID: CVE-2022-34472
https://bugzilla.mozilla.org/show_bug.cgi?id=1770123
Common Vulnerability Exposure (CVE) ID: CVE-2022-34479
https://bugzilla.mozilla.org/show_bug.cgi?id=1745595
Common Vulnerability Exposure (CVE) ID: CVE-2022-34481
https://bugzilla.mozilla.org/show_bug.cgi?id=1497246
Common Vulnerability Exposure (CVE) ID: CVE-2022-34484
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.