Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2018.0203
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2018-0203)
Summary:The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2018-0203 advisory.
Description:Summary:
The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2018-0203 advisory.

Vulnerability Insight:
* A buffer overflow can occur when manipulating the SVG animatedPathSegList
through script. This results in a potentially exploitable crash
(CVE-2018-5127).
* A lack of parameter validation on IPC messages results in a potential
out-of-bounds write through malformed IPC messages. This can potentially
allow for sandbox escape through memory corruption in the parent process
(CVE-2018-5129).
* An integer overflow can occur during conversion of text to some Unicode
character sets due to an unchecked length parameter (CVE-2018-5144).
* An out of bounds memory write while processing Vorbis audio data was
reported through the Pwn2Own contest (CVE-2018-5146).
* Mozilla developers and community members reported memory safety bugs
present in Firefox 58, Firefox ESR 52.6, and Thunderbird 52.6. Some of
these bugs showed evidence of memory corruption and we presume that with
enough effort that some of these could be exploited to run arbitrary code
(CVE-2018-5125).
* Mozilla developers reported memory safety bugs present in Firefox ESR 52.6
and Thunderbird 52.6. These bugs showed evidence of memory corruption and we
presume that with enough effort that some of these could be exploited to run
arbitrary code (CVE-2018-5145).

Affected Software/OS:
'thunderbird, thunderbird-l10n' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-5125
BugTraq ID: 103388
http://www.securityfocus.com/bid/103388
Debian Security Information: DSA-4139 (Google Search)
https://www.debian.org/security/2018/dsa-4139
Debian Security Information: DSA-4155 (Google Search)
https://www.debian.org/security/2018/dsa-4155
https://security.gentoo.org/glsa/201810-01
https://security.gentoo.org/glsa/201811-13
https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
RedHat Security Advisories: RHSA-2018:0526
https://access.redhat.com/errata/RHSA-2018:0526
RedHat Security Advisories: RHSA-2018:0527
https://access.redhat.com/errata/RHSA-2018:0527
RedHat Security Advisories: RHSA-2018:0647
https://access.redhat.com/errata/RHSA-2018:0647
RedHat Security Advisories: RHSA-2018:0648
https://access.redhat.com/errata/RHSA-2018:0648
http://www.securitytracker.com/id/1040514
https://usn.ubuntu.com/3545-1/
https://usn.ubuntu.com/3596-1/
https://usn.ubuntu.com/3688-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-5127
Common Vulnerability Exposure (CVE) ID: CVE-2018-5129
Common Vulnerability Exposure (CVE) ID: CVE-2018-5144
BugTraq ID: 103384
http://www.securityfocus.com/bid/103384
Common Vulnerability Exposure (CVE) ID: CVE-2018-5145
Common Vulnerability Exposure (CVE) ID: CVE-2018-5146
BugTraq ID: 103432
http://www.securityfocus.com/bid/103432
Debian Security Information: DSA-4140 (Google Search)
https://www.debian.org/security/2018/dsa-4140
Debian Security Information: DSA-4143 (Google Search)
https://www.debian.org/security/2018/dsa-4143
https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html
RedHat Security Advisories: RHSA-2018:0549
https://access.redhat.com/errata/RHSA-2018:0549
RedHat Security Advisories: RHSA-2018:0649
https://access.redhat.com/errata/RHSA-2018:0649
RedHat Security Advisories: RHSA-2018:1058
https://access.redhat.com/errata/RHSA-2018:1058
http://www.securitytracker.com/id/1040544
https://usn.ubuntu.com/3599-1/
https://usn.ubuntu.com/3604-1/
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.