Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.884302
Categoría:CentOS Local Security Checks
Título:CentOS: Security Advisory for thunderbird (CESA-2024:0027)
Resumen:The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2024:0027 advisory.
Descripción:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the CESA-2024:0027 advisory.

Vulnerability Insight:
Mozilla Thunderbird is a standalone mail and newsgroup client.

This Update upgrades Thunderbird to version 115.6.0.

Security Fix(es):

* Mozilla: Heap-buffer-overflow affecting WebGL <, code>, DrawElementsInstanced<, /code>, method with Mesa VM driver (CVE-2023-6856)

* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864)

* Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761)

* Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762)

* Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857)

* Mozilla: Heap buffer overflow in <, code>, nsTextFragment<, /code>, (CVE-2023-6858)

* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)

* Mozilla: Potential sandbox escape due to <, code>, VideoBridge<, /code>, lack of texture validation (CVE-2023-6860)

* Mozilla: Heap buffer overflow affected <, code>, nsWindow::PickerOpen(void)<, /code>, in headless mode (CVE-2023-6861)

* Mozilla: Use-after-free in <, code>, nsDNSService<, /code>, (CVE-2023-6862)

* Mozilla: Undefined behavior in <, code>, ShutdownObserver()<, /code>, (CVE-2023-6863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Software/OS:
'thunderbird' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2023-6856
Debian Security Information: DSA-5581 (Google Search)
https://www.debian.org/security/2023/dsa-5581
Debian Security Information: DSA-5582 (Google Search)
https://www.debian.org/security/2023/dsa-5582
https://security.gentoo.org/glsa/202401-10
https://bugzilla.mozilla.org/show_bug.cgi?id=1843782
https://www.mozilla.org/security/advisories/mfsa2023-54/
https://www.mozilla.org/security/advisories/mfsa2023-55/
https://www.mozilla.org/security/advisories/mfsa2023-56/
https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-6864
Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015
Common Vulnerability Exposure (CVE) ID: CVE-2023-50761
https://bugzilla.mozilla.org/show_bug.cgi?id=1865647
Common Vulnerability Exposure (CVE) ID: CVE-2023-50762
https://bugzilla.mozilla.org/show_bug.cgi?id=1862625
Common Vulnerability Exposure (CVE) ID: CVE-2023-6857
https://bugzilla.mozilla.org/show_bug.cgi?id=1796023
Common Vulnerability Exposure (CVE) ID: CVE-2023-6858
https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
Common Vulnerability Exposure (CVE) ID: CVE-2023-6859
https://bugzilla.mozilla.org/show_bug.cgi?id=1840144
Common Vulnerability Exposure (CVE) ID: CVE-2023-6860
https://bugzilla.mozilla.org/show_bug.cgi?id=1854669
Common Vulnerability Exposure (CVE) ID: CVE-2023-6861
https://bugzilla.mozilla.org/show_bug.cgi?id=1864118
Common Vulnerability Exposure (CVE) ID: CVE-2023-6862
https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
Common Vulnerability Exposure (CVE) ID: CVE-2023-6863
https://bugzilla.mozilla.org/show_bug.cgi?id=1868901
CopyrightCopyright (C) 2024 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.