Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55550
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2005:174 (mozilla-thunderbird)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to mozilla-thunderbird
announced via advisory MDKSA-2005:174.

Updated Mozilla Thunderbird packages fix various vulnerabilities:

The run-mozilla.sh script, with debugging enabled, would allow local
users to create or overwrite arbitrary files via a symlink attack on
temporary files (CVE-2005-2353).

A bug in the way Thunderbird processes XBM images could be used to
execute arbitrary code via a specially crafted XBM image file
(CVE-2005-2701).

A bug in the way Thunderbird handles certain Unicode sequences could be
used to execute arbitrary code via viewing a specially crafted Unicode
sequence (CVE-2005-2702).

A bug in the way Thunderbird makes XMLHttp requests could be abused by
a malicious web page to exploit other proxy or server flaws from the
victim's machine
however, the default behaviour of the browser is to
disallow this (CVE-2005-2703).

A bug in the way Thunderbird implemented its XBL interface could be
abused by a malicious web page to create an XBL binding in such a way
as to allow arbitrary JavaScript execution with chrome permissions
(CVE-2005-2704).

An integer overflow in Thunderbird's JavaScript engine could be
manipulated in certain conditions to allow a malicious web page to
execute arbitrary code (CVE-2005-2705).

A bug in the way Thunderbird displays about: pages could be used to
execute JavaScript with chrome privileges (CVE-2005-2706).

A bug in the way Thunderbird opens new windows could be used by a
malicious web page to construct a new window without any user interface
elements (such as address bar and status bar) that could be used to
potentially mislead the user (CVE-2005-2707).

A bug in the way Thunderbird proceesed URLs on the command line could
be used to execute arbitary commands as the user running Thunderbird

this could be abused by clicking on a supplied link, such as from an
instant messaging client (CVE-2005-2968).

Tom Ferris reported that Thunderbird would crash when processing a
domain name consisting solely of soft-hyphen characters due to a heap
overflow when IDN processing results in an empty string after removing
non-wrapping chracters, such as soft-hyphens. This could be exploited
to run or or install malware on the user's computer (CVE-2005-2871).

The updated packages have been patched to correct these issues.

Affected versions: 10.2, 2006.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2005:174
http://www.mozilla.org/security/announce/mfsa2005-59.html
http://www.mozilla.org/security/announce/mfsa2005-58.html
http://www.mozilla.org/security/announce/mfsa2005-57.html

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-2353
BugTraq ID: 14443
http://www.securityfocus.com/bid/14443
Debian Security Information: DSA-1046 (Google Search)
http://www.debian.org/security/2006/dsa-1046
Debian Security Information: DSA-1051 (Google Search)
http://www.debian.org/security/2006/dsa-1051
http://www.mandriva.com/security/advisories?name=MDKSA-2005:173
http://www.mandriva.com/security/advisories?name=MDKSA-2005:174
http://secunia.com/advisories/19863
http://secunia.com/advisories/19941
https://usn.ubuntu.com/157-1/
Common Vulnerability Exposure (CVE) ID: CVE-2005-2701
1014954
http://securitytracker.com/id?1014954
14916
http://www.securityfocus.com/bid/14916
15495
http://www.securityfocus.com/bid/15495
16911
http://secunia.com/advisories/16911
16917
http://secunia.com/advisories/16917
16977
http://secunia.com/advisories/16977
17014
http://secunia.com/advisories/17014
17026
http://secunia.com/advisories/17026
17149
http://secunia.com/advisories/17149
17263
http://secunia.com/advisories/17263
17284
http://secunia.com/advisories/17284
19643
http://www.osvdb.org/19643
ADV-2005-1824
http://www.vupen.com/english/advisories/2005/1824
DSA-838
http://www.debian.org/security/2005/dsa-838
DSA-866
http://www.debian.org/security/2005/dsa-866
DSA-868
http://www.debian.org/security/2005/dsa-868
FLSA-2006:168375
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html
MDKSA-2005:169
http://www.mandriva.com/security/advisories?name=MDKSA-2005:169
MDKSA-2005:170
http://www.mandriva.com/security/advisories?name=MDKSA-2005:170
MDKSA-2005:174
RHSA-2005:785
http://www.redhat.com/support/errata/RHSA-2005-785.html
RHSA-2005:789
http://www.redhat.com/support/errata/RHSA-2005-789.html
SCOSA-2005.49
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
SUSE-SA:2005:058
http://www.novell.com/linux/security/advisories/2005_58_mozilla.html
USN-200-1
http://www.ubuntu.com/usn/usn-200-1
http://www.mozilla.org/security/announce/mfsa2005-58.html
mozilla-xbm-bo(22373)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22373
oval:org.mitre.oval:def:1480
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1480
oval:org.mitre.oval:def:9323
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323
Common Vulnerability Exposure (CVE) ID: CVE-2005-2702
14918
http://www.securityfocus.com/bid/14918
17042
http://secunia.com/advisories/17042
17090
http://secunia.com/advisories/17090
RHSA-2005:791
http://www.redhat.com/support/errata/RHSA-2005-791.html
mozilla-zerowidthnonjoiner-stack-corruption(22375)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22375
oval:org.mitre.oval:def:1150
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1150
oval:org.mitre.oval:def:11609
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11609
Common Vulnerability Exposure (CVE) ID: CVE-2005-2703
14923
http://www.securityfocus.com/bid/14923
mozilla-xmlhttprequest-spoofing(22376)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22376
oval:org.mitre.oval:def:10767
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10767
oval:org.mitre.oval:def:1089
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1089
Common Vulnerability Exposure (CVE) ID: CVE-2005-2704
14921
http://www.securityfocus.com/bid/14921
mozilla-thunderbird-xml-object-spoof(22824)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22824
oval:org.mitre.oval:def:1272
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1272
oval:org.mitre.oval:def:9784
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9784
Common Vulnerability Exposure (CVE) ID: CVE-2005-2705
14917
http://www.securityfocus.com/bid/14917
https://bugzilla.mozilla.org/show_bug.cgi?id=303213
mozilla-javascript-bo(22377)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22377
oval:org.mitre.oval:def:10367
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10367
oval:org.mitre.oval:def:1307
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1307
Common Vulnerability Exposure (CVE) ID: CVE-2005-2706
14920
http://www.securityfocus.com/bid/14920
19648
http://www.osvdb.org/19648
19823
http://secunia.com/advisories/19823
SUSE-SA:2006:022
http://www.novell.com/linux/security/advisories/2006_04_25.html
mozilla-about-execute-code(22378)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22378
oval:org.mitre.oval:def:11317
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11317
oval:org.mitre.oval:def:1443
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1443
Common Vulnerability Exposure (CVE) ID: CVE-2005-2707
14919
http://www.securityfocus.com/bid/14919
http://www.mozilla.org/security/announce/mfsa2005-59.html
mozilla-chrome-window-spoofing(22380)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22380
oval:org.mitre.oval:def:11130
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11130
oval:org.mitre.oval:def:1197
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1197
Common Vulnerability Exposure (CVE) ID: CVE-2005-2968
14888
http://www.securityfocus.com/bid/14888
16869
http://secunia.com/advisories/16869
ADV-2005-1794
http://www.vupen.com/english/advisories/2005/1794
USN-186-1
http://www.ubuntu.com/usn/usn-186-1
USN-186-2
http://www.ubuntu.com/usn/usn-186-2
VU#914681
http://www.kb.cert.org/vuls/id/914681
https://bugzilla.mozilla.org/show_bug.cgi?id=307185
oval:org.mitre.oval:def:11105
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11105
Common Vulnerability Exposure (CVE) ID: CVE-2005-2871
1014877
http://securitytracker.com/id?1014877
14784
http://www.securityfocus.com/bid/14784
16764
http://secunia.com/advisories/16764
16766
http://secunia.com/advisories/16766
16767
http://secunia.com/advisories/16767
19255
http://www.osvdb.org/19255
20050909 Mozilla Firefox "Host:" Buffer Overflow
http://marc.info/?l=full-disclosure&m=112624614008387&w=2
20050911 FireFox "Host:" Buffer Overflow is not just exploitable on FireFox
http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0316.html
83
http://securityreason.com/securityalert/83
ADV-2005-1690
http://www.vupen.com/english/advisories/2005/1690
ADV-2005-1691
http://www.vupen.com/english/advisories/2005/1691
DSA-837
http://www.debian.org/security/2005/dsa-837
GLSA-200509-11
http://www.gentoo.org/security/en/glsa/glsa-200509-11.xml
P-303
http://www.ciac.org/ciac/bulletins/p-303.shtml
RHSA-2005:768
http://www.redhat.com/support/errata/RHSA-2005-768.html
RHSA-2005:769
http://www.redhat.com/support/errata/RHSA-2005-769.html
USN-181-1
http://www.ubuntu.com/usn/usn-181-1
VU#573857
http://www.kb.cert.org/vuls/id/573857
http://www.mozilla.org/security/announce/mfsa2005-57.html
http://www.securiteam.com/securitynews/5RP0B0UGVW.html
http://www.security-protocols.com/advisory/sp-x17-advisory.txt
http://www.security-protocols.com/firefox-death.html
https://bugzilla.mozilla.org/show_bug.cgi?id=307259
mozilla-url-bo(22207)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22207
oval:org.mitre.oval:def:1287
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1287
oval:org.mitre.oval:def:584
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A584
oval:org.mitre.oval:def:9608
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9608
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.