Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57302
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1159-1)
Summary:The remote host is missing an update for the Debian 'mozilla-thunderbird' package(s) announced via the DSA-1159-1 advisory.;; This VT has been deprecated and merged into the VT 'Debian: Security Advisory (DSA-1159)' (OID: 1.3.6.1.4.1.25623.1.0.57358).
Description:Summary:
The remote host is missing an update for the Debian 'mozilla-thunderbird' package(s) announced via the DSA-1159-1 advisory.

This VT has been deprecated and merged into the VT 'Debian: Security Advisory (DSA-1159)' (OID: 1.3.6.1.4.1.25623.1.0.57358).

Vulnerability Insight:
The latest security updates of Mozilla Thunderbird introduced a regression that led to a dysfunctional attachment panel which warrants a correction to fix this issue. For reference please find below the original advisory text:

Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

CVE-2006-2779

Mozilla team members discovered several crashes during testing of the browser engine showing evidence of memory corruption which may also lead to the execution of arbitrary code. The last bit of this problem will be corrected with the next update. You can prevent any trouble by disabling Javascript. [MFSA-2006-32]

CVE-2006-3805

The Javascript engine might allow remote attackers to execute arbitrary code. [MFSA-2006-50]

CVE-2006-3806

Multiple integer overflows in the Javascript engine might allow remote attackers to execute arbitrary code. [MFSA-2006-50]

CVE-2006-3807

Specially crafted Javascript allows remote attackers to execute arbitrary code. [MFSA-2006-51]

CVE-2006-3808

Remote Proxy AutoConfig (PAC) servers could execute code with elevated privileges via a specially crafted PAC script. [MFSA-2006-52]

CVE-2006-3809

Scripts with the UniversalBrowserRead privilege could gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data. [MFSA-2006-53]

CVE-2006-3810

A cross-site scripting vulnerability allows remote attackers to inject arbitrary web script or HTML. [MFSA-2006-54]

For the stable distribution (sarge) these problems have been fixed in version 1.0.2-2.sarge1.0.8b.2.

For the unstable distribution (sid) these problems have been fixed in version 1.5.0.5-1.

We recommend that you upgrade your mozilla-thunderbird package.

Affected Software/OS:
'mozilla-thunderbird' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
BugTraq ID: 18228
http://www.securityfocus.com/bid/18228
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/435795/100/0/threaded
Cert/CC Advisory: TA06-153A
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
CERT/CC vulnerability note: VU#466673
http://www.kb.cert.org/vuls/id/466673
Debian Security Information: DSA-1118 (Google Search)
http://www.debian.org/security/2006/dsa-1118
Debian Security Information: DSA-1120 (Google Search)
http://www.debian.org/security/2006/dsa-1120
Debian Security Information: DSA-1134 (Google Search)
http://www.debian.org/security/2006/dsa-1134
Debian Security Information: DSA-1159 (Google Search)
http://www.debian.org/security/2006/dsa-1159
Debian Security Information: DSA-1160 (Google Search)
http://www.debian.org/security/2006/dsa-1160
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
HPdes Security Advisory: HPSBUX02153
http://www.securityfocus.com/archive/1/446658/100/200/threaded
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9762
http://www.redhat.com/support/errata/RHSA-2006-0578.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
RedHat Security Advisories: RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
http://securitytracker.com/id?1016202
http://securitytracker.com/id?1016214
http://secunia.com/advisories/20376
http://secunia.com/advisories/20382
http://secunia.com/advisories/20561
http://secunia.com/advisories/20709
http://secunia.com/advisories/21134
http://secunia.com/advisories/21176
http://secunia.com/advisories/21178
http://secunia.com/advisories/21183
http://secunia.com/advisories/21188
http://secunia.com/advisories/21210
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21324
http://secunia.com/advisories/21336
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://secunia.com/advisories/21631
http://secunia.com/advisories/21634
http://secunia.com/advisories/21654
http://secunia.com/advisories/22065
http://secunia.com/advisories/22066
http://secunia.com/advisories/27216
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102943-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200387-1
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
https://usn.ubuntu.com/296-1/
https://usn.ubuntu.com/296-2/
https://usn.ubuntu.com/297-1/
https://usn.ubuntu.com/297-3/
https://usn.ubuntu.com/323-1/
http://www.vupen.com/english/advisories/2006/2106
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2007/3488
http://www.vupen.com/english/advisories/2008/0083
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26843
Common Vulnerability Exposure (CVE) ID: CVE-2006-3805
1016586
http://securitytracker.com/id?1016586
1016587
http://securitytracker.com/id?1016587
1016588
http://securitytracker.com/id?1016588
102763
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
19181
http://www.securityfocus.com/bid/19181
19873
http://secunia.com/advisories/19873
20060703-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
20060727 rPSA-2006-0137-1 firefox
http://www.securityfocus.com/archive/1/441333/100/0/threaded
21216
http://secunia.com/advisories/21216
21228
http://secunia.com/advisories/21228
21229
http://secunia.com/advisories/21229
21243
http://secunia.com/advisories/21243
21246
http://secunia.com/advisories/21246
21250
http://secunia.com/advisories/21250
21262
http://secunia.com/advisories/21262
21269
21270
21275
http://secunia.com/advisories/21275
21336
21343
http://secunia.com/advisories/21343
21358
http://secunia.com/advisories/21358
21361
http://secunia.com/advisories/21361
21529
http://secunia.com/advisories/21529
21532
21607
21631
21634
21654
21675
http://secunia.com/advisories/21675
22055
http://secunia.com/advisories/22055
22065
22066
22210
http://secunia.com/advisories/22210
22342
http://secunia.com/advisories/22342
ADV-2006-2998
http://www.vupen.com/english/advisories/2006/2998
ADV-2006-3748
ADV-2006-3749
ADV-2008-0083
DSA-1159
DSA-1160
DSA-1161
http://www.debian.org/security/2006/dsa-1161
GLSA-200608-02
http://security.gentoo.org/glsa/glsa-200608-02.xml
GLSA-200608-03
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml
GLSA-200608-04
http://security.gentoo.org/glsa/glsa-200608-04.xml
HPSBUX02153
HPSBUX02156
MDKSA-2006:143
MDKSA-2006:145
MDKSA-2006:146
RHSA-2006:0594
RHSA-2006:0608
http://www.redhat.com/support/errata/RHSA-2006-0608.html
RHSA-2006:0609
RHSA-2006:0610
RHSA-2006:0611
SSRT061181
SSRT061236
SUSE-SA:2006:048
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html
TA06-208A
http://www.us-cert.gov/cas/techalerts/TA06-208A.html
USN-327-1
https://usn.ubuntu.com/327-1/
USN-329-1
https://usn.ubuntu.com/329-1/
USN-350-1
http://www.ubuntu.com/usn/usn-350-1
USN-354-1
http://www.ubuntu.com/usn/usn-354-1
USN-361-1
http://www.ubuntu.com/usn/usn-361-1
VU#876420
http://www.kb.cert.org/vuls/id/876420
http://www.mozilla.org/security/announce/2006/mfsa2006-50.html
https://issues.rpath.com/browse/RPL-536
https://issues.rpath.com/browse/RPL-537
mozilla-garbage-collection-object-deletion(27986)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27986
oval:org.mitre.oval:def:10690
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10690
Common Vulnerability Exposure (CVE) ID: CVE-2006-3806
ADV-2007-0058
http://www.vupen.com/english/advisories/2007/0058
VU#655892
http://www.kb.cert.org/vuls/id/655892
mozilla-javascript-engine-overflow(27987)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27987
oval:org.mitre.oval:def:11232
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11232
Common Vulnerability Exposure (CVE) ID: CVE-2006-3807
VU#687396
http://www.kb.cert.org/vuls/id/687396
http://www.mozilla.org/security/announce/2006/mfsa2006-51.html
mozilla-js-constructor-code-execution(27988)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27988
oval:org.mitre.oval:def:10374
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10374
Common Vulnerability Exposure (CVE) ID: CVE-2006-3808
http://www.mozilla.org/security/announce/2006/mfsa2006-52.html
mozilla-pac-code-execution(27989)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27989
oval:org.mitre.oval:def:10845
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10845
Common Vulnerability Exposure (CVE) ID: CVE-2006-3809
http://www.mozilla.org/security/announce/2006/mfsa2006-53.html
mozilla-universalbrowserread-escalation(27990)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27990
oval:org.mitre.oval:def:9753
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9753
Common Vulnerability Exposure (CVE) ID: CVE-2006-3810
VU#911004
http://www.kb.cert.org/vuls/id/911004
http://www.mozilla.org/security/announce/2006/mfsa2006-54.html
mozilla-xpcnativewrapper-xss(27991)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27991
oval:org.mitre.oval:def:10113
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10113
Common Vulnerability Exposure (CVE) ID: CVE-2006-3811
102971
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1
25839
http://secunia.com/advisories/25839
ADV-2007-2350
http://www.vupen.com/english/advisories/2007/2350
VU#527676
http://www.kb.cert.org/vuls/id/527676
http://www.mozilla.org/security/announce/2006/mfsa2006-55.html
mozilla-multiple-memory-corruption(27992)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27992
oval:org.mitre.oval:def:9934
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9934
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.