English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 76783 CVE descriptions
and 40246 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55587
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-200-1 (mozilla-thunderbird)
Summary:Ubuntu USN-200-1 (mozilla-thunderbird)
Description:
The remote host is missing an update to mozilla-thunderbird
announced via advisory USN-200-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected: mozilla-thunderbird

A buffer overflow was discovered in the XBM image handler. By tricking
an user into opening a specially crafted XBM image, an attacker could
exploit this to execute arbitrary code with the user's privileges.
(CVE-2005-2701)

Mats Palmgren discovered a buffer overflow in the Unicode string
parser. Unicode strings that contained zero-width non-joiner
characters caused a browser crash, which could possibly even exploited
to execute arbitrary code with the user's privileges.
(CVE-2005-2702)

Georgi Guninski reported an integer overflow in the JavaScript engine.
This could be exploited to run arbitrary code under some conditions.
(CVE-2005-2705)

Peter Zelezny discovered that URLs which are passed to Thunderbird on the
command line are not correctly protected against interpretation by the shell.
If Thunderbird is configured as the default handler for mailto: URLs, this
could be exploited to execute arbitrary code with user privileges by tricking
the user into clicking on a specially crafted URL (for example, in an email or
chat client). (CVE-2005-2968)

This update also fixes some less critical issues which are described
at http://www.mozilla.org/security/announce/mfsa2005-58.html.
(CVE-2005-2703, CVE-2005-2704, CVE-2005-2706, CVE-2005-2707)

The enigmail plugin has been updated to work with the new
Thunderbird and Mozilla versions.

Solution:
The problem can be corrected by upgrading the affected package to
version 1.0.7-0ubuntu04.10 (for Ubuntu 4.10), or 1.0.7-0ubuntu05.04
(for Ubuntu 5.04). After a standard system upgrade you need to
restart Thunderbird to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-200-1

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-2701
Debian Security Information: DSA-868 (Google Search)
http://www.debian.org/security/2005/dsa-868
Debian Security Information: DSA-838 (Google Search)
http://www.debian.org/security/2005/dsa-838
Debian Security Information: DSA-866 (Google Search)
http://www.debian.org/security/2005/dsa-866
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html
http://www.mandriva.com/security/advisories?name=MDKSA-2005:169
http://www.mandriva.com/security/advisories?name=MDKSA-2005:170
http://www.mandriva.com/security/advisories?name=MDKSA-2005:174
http://www.redhat.com/support/errata/RHSA-2005-785.html
http://www.redhat.com/support/errata/RHSA-2005-789.html
SCO Security Bulletin: SCOSA-2005.49
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
SuSE Security Announcement: SUSE-SA:2005:058 (Google Search)
http://www.novell.com/linux/security/advisories/2005_58_mozilla.html
http://www.ubuntu.com/usn/usn-200-1
BugTraq ID: 14916
http://www.securityfocus.com/bid/14916
BugTraq ID: 15495
http://www.securityfocus.com/bid/15495
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9323
http://www.vupen.com/english/advisories/2005/1824
http://www.osvdb.org/19643
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1480
http://securitytracker.com/id?1014954
http://secunia.com/advisories/16911
http://secunia.com/advisories/16917
http://secunia.com/advisories/17149
http://secunia.com/advisories/17284
http://secunia.com/advisories/17026
http://secunia.com/advisories/17263
http://secunia.com/advisories/16977
http://secunia.com/advisories/17014
XForce ISS Database: mozilla-xbm-bo(22373)
http://xforce.iss.net/xforce/xfdb/22373
Common Vulnerability Exposure (CVE) ID: CVE-2005-2702
http://www.redhat.com/support/errata/RHSA-2005-791.html
BugTraq ID: 14918
http://www.securityfocus.com/bid/14918
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11609
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1150
http://secunia.com/advisories/17042
http://secunia.com/advisories/17090
XForce ISS Database: mozilla-zerowidthnonjoiner-stack-corruption(22375)
http://xforce.iss.net/xforce/xfdb/22375
Common Vulnerability Exposure (CVE) ID: CVE-2005-2703
BugTraq ID: 14923
http://www.securityfocus.com/bid/14923
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10767
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1089
XForce ISS Database: mozilla-xmlhttprequest-spoofing(22376)
http://xforce.iss.net/xforce/xfdb/22376
Common Vulnerability Exposure (CVE) ID: CVE-2005-2704
BugTraq ID: 14921
http://www.securityfocus.com/bid/14921
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9784
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1272
XForce ISS Database: mozilla-thunderbird-xml-object-spoof(22824)
http://xforce.iss.net/xforce/xfdb/22824
Common Vulnerability Exposure (CVE) ID: CVE-2005-2705
https://bugzilla.mozilla.org/show_bug.cgi?id=303213
BugTraq ID: 14917
http://www.securityfocus.com/bid/14917
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10367
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1307
XForce ISS Database: mozilla-javascript-bo(22377)
http://xforce.iss.net/xforce/xfdb/22377
Common Vulnerability Exposure (CVE) ID: CVE-2005-2706
SuSE Security Announcement: SUSE-SA:2006:022 (Google Search)
http://www.novell.com/linux/security/advisories/2006_04_25.html
SuSE Security Announcement: SUSE-SA:2006:004 (Google Search)
BugTraq ID: 14920
http://www.securityfocus.com/bid/14920
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11317
http://www.osvdb.org/19648
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1443
http://secunia.com/advisories/19823
XForce ISS Database: mozilla-about-execute-code(22378)
http://xforce.iss.net/xforce/xfdb/22378
Common Vulnerability Exposure (CVE) ID: CVE-2005-2707
BugTraq ID: 14919
http://www.securityfocus.com/bid/14919
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11130
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1197
XForce ISS Database: mozilla-chrome-window-spoofing(22380)
http://xforce.iss.net/xforce/xfdb/22380
Common Vulnerability Exposure (CVE) ID: CVE-2005-2968
http://www.ubuntu.com/usn/usn-186-1
http://www.ubuntu.com/usn/usn-186-2
CERT/CC vulnerability note: VU#914681
http://www.kb.cert.org/vuls/id/914681
BugTraq ID: 14888
http://www.securityfocus.com/bid/14888
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11105
http://www.vupen.com/english/advisories/2005/1794
http://secunia.com/advisories/16869
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.