English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72022 CVE descriptions
and 38680 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57047
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-297-1 (mozilla-thunderbird)
Summary:Ubuntu USN-297-1 (mozilla-thunderbird)
Description:
The remote host is missing an update to mozilla-thunderbird
announced via advisory USN-297-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

For details, please visit the referenced security advisories.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
mozilla-thunderbird 1.5.0.4-0ubuntu6.06
mozilla-thunderbird-enigmail 2:0.94-0ubuntu4.1

After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-297-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2775
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/archive/1/435795/100/0/threaded
Debian Security Information: DSA-1118 (Google Search)
http://www.debian.org/security/2006/dsa-1118
Debian Security Information: DSA-1120 (Google Search)
http://www.debian.org/security/2006/dsa-1120
Debian Security Information: DSA-1134 (Google Search)
http://www.debian.org/security/2006/dsa-1134
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
HPdes Security Advisory: HPSBUX02153
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
http://www.ubuntulinux.org/support/documentation/usn/usn-296-1
http://www.ubuntulinux.org/support/documentation/usn/usn-297-1
http://www.ubuntulinux.org/support/documentation/usn/usn-296-2
http://www.ubuntulinux.org/support/documentation/usn/usn-297-3
http://www.ubuntulinux.org/support/documentation/usn/usn-323-1
CERT/CC vulnerability note: VU#243153
http://www.kb.cert.org/vuls/id/243153
Cert/CC Advisory: TA06-153A
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
BugTraq ID: 18228
http://www.securityfocus.com/bid/18228
http://www.vupen.com/english/advisories/2006/2106
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2008/0083
http://securitytracker.com/id?1016202
http://securitytracker.com/id?1016214
http://secunia.com/advisories/20376
http://secunia.com/advisories/20382
http://secunia.com/advisories/20561
http://secunia.com/advisories/20709
http://secunia.com/advisories/21183
http://secunia.com/advisories/21176
http://secunia.com/advisories/21178
http://secunia.com/advisories/21188
http://secunia.com/advisories/21210
http://secunia.com/advisories/21324
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://secunia.com/advisories/22065
http://secunia.com/advisories/22066
XForce ISS Database: mozilla-xul-code-execution(26846)
http://xforce.iss.net/xforce/xfdb/26846
Common Vulnerability Exposure (CVE) ID: CVE-2006-2776
http://www.redhat.com/support/errata/RHSA-2006-0578.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
RedHat Security Advisories: RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
CERT/CC vulnerability note: VU#575969
http://www.kb.cert.org/vuls/id/575969
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9849
http://www.vupen.com/english/advisories/2007/0573
http://secunia.com/advisories/21134
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21336
http://secunia.com/advisories/21631
http://secunia.com/advisories/24108
XForce ISS Database: mozilla-contentdefined-code-execution(26848)
http://xforce.iss.net/xforce/xfdb/26848
Common Vulnerability Exposure (CVE) ID: CVE-2006-2778
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
CERT/CC vulnerability note: VU#421529
http://www.kb.cert.org/vuls/id/421529
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9703
http://www.vupen.com/english/advisories/2007/0058
XForce ISS Database: mozilla-crypto-signtext-bo(26849)
http://xforce.iss.net/xforce/xfdb/26849
Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
Debian Security Information: DSA-1159 (Google Search)
http://www.debian.org/security/2006/dsa-1159
Debian Security Information: DSA-1160 (Google Search)
http://www.debian.org/security/2006/dsa-1160
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102943-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200387-1
CERT/CC vulnerability note: VU#466673
http://www.kb.cert.org/vuls/id/466673
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9762
http://www.vupen.com/english/advisories/2007/3488
http://secunia.com/advisories/21654
http://secunia.com/advisories/21634
http://secunia.com/advisories/27216
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
http://xforce.iss.net/xforce/xfdb/26843
Common Vulnerability Exposure (CVE) ID: CVE-2006-2780
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11305
Common Vulnerability Exposure (CVE) ID: CVE-2006-2781
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10247
http://secunia.com/advisories/20394
XForce ISS Database: mozilla-vcard-doublefree-memory-corruption(26850)
http://xforce.iss.net/xforce/xfdb/26850
Common Vulnerability Exposure (CVE) ID: CVE-2006-2783
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10772
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2008/2094/references
http://secunia.com/advisories/31074
http://www.vupen.com/english/advisories/2009/1522
XForce ISS Database: mozilla-bom-utf8-xss(26852)
http://xforce.iss.net/xforce/xfdb/26852
Common Vulnerability Exposure (CVE) ID: CVE-2006-2786
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9966
XForce ISS Database: mozilla-http-response-smuggling(26844)
http://xforce.iss.net/xforce/xfdb/26844
Common Vulnerability Exposure (CVE) ID: CVE-2006-2787
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9491
XForce ISS Database: mozilla-valueof-sandbox-bypass(26842)
http://xforce.iss.net/xforce/xfdb/26842
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 38680 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.