Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2016.0409
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2016-0409)
Resumen:The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2016-0409 advisory.
Descripción:Summary:
The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2016-0409 advisory.

Vulnerability Insight:
A heap-buffer-overflow in Cairo when processing SVG content caused by
compiler optimization, resulting in a potentially exploitable crash
(CVE-2016-5296).

The Mozilla Updater can be made to choose an arbitrary target working
directory for output files resulting from the update process. This
vulnerability requires local system access (CVE-2016-5294).

An error in argument length checking in JavaScript, leading to potential
integer overflows or other bounds checking issues (CVE-2016-5297).

A buffer overflow resulting in a potentially exploitable crash due to
memory allocation issues when handling large amounts of incoming data
(CVE-2016-9066).

A same-origin policy bypass with local shortcut files to load arbitrary
local content from disk (CVE-2016-5291).

Mozilla developers and community members Olli Pettay, Christian Holler,
Ehsan Akhgari, Jon Coppeard, Gary Kwong, Tooru Fujisawa, Philipp, and
Randell Jesup reported memory safety bugs present in Thunderbird ESR
45.4. Some of these bugs showed evidence of memory corruption and we
presume that with enough effort that some of these could be exploited to
run arbitrary code (CVE-2016-5290).

A use-after-free vulnerability in SVG Animation has been discovered. An
exploit built on this vulnerability has been discovered in the wild
targeting Firefox and Tor Browser users on Windows (CVE-2016-9079).

Affected Software/OS:
'thunderbird, thunderbird-l10n' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-5290
BugTraq ID: 94335
http://www.securityfocus.com/bid/94335
Debian Security Information: DSA-3730 (Google Search)
https://www.debian.org/security/2016/dsa-3730
https://security.gentoo.org/glsa/201701-15
RedHat Security Advisories: RHSA-2016:2780
http://rhn.redhat.com/errata/RHSA-2016-2780.html
RedHat Security Advisories: RHSA-2016:2825
http://rhn.redhat.com/errata/RHSA-2016-2825.html
http://www.securitytracker.com/id/1037298
Common Vulnerability Exposure (CVE) ID: CVE-2016-5291
BugTraq ID: 94336
http://www.securityfocus.com/bid/94336
Common Vulnerability Exposure (CVE) ID: CVE-2016-5294
Common Vulnerability Exposure (CVE) ID: CVE-2016-5296
BugTraq ID: 94339
http://www.securityfocus.com/bid/94339
Common Vulnerability Exposure (CVE) ID: CVE-2016-5297
Common Vulnerability Exposure (CVE) ID: CVE-2016-9066
Common Vulnerability Exposure (CVE) ID: CVE-2016-9079
BugTraq ID: 94591
http://www.securityfocus.com/bid/94591
https://www.exploit-db.com/exploits/41151/
https://www.exploit-db.com/exploits/42327/
https://security.gentoo.org/glsa/201701-35
RedHat Security Advisories: RHSA-2016:2843
http://rhn.redhat.com/errata/RHSA-2016-2843.html
RedHat Security Advisories: RHSA-2016:2850
http://rhn.redhat.com/errata/RHSA-2016-2850.html
http://www.securitytracker.com/id/1037370
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.