Description: | Description:
The remote host is missing an update to thunderbird announced via advisory FEDORA-2008-6706.
Mozilla Thunderbird is a standalone mail and newsgroup client.
Update Information:
Updated thunderbird packages that fix several security issues are now available for Fedora 8. Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2802, CVE-2008-2803) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Thunderbird was updated to upstream version 2.0.0.16 to address these flaws: http://www.mozilla.org/security/known- vulnerabilities/thunderbird20.html#thunderbird2.0.0.16 ChangeLog:
* Wed Jul 23 2008 Christopher Aillon 2.0.0.16-1 - Update to 2.0.0.16
References:
[ 1 ] Bug #452600 - CVE-2008-2802 Firefox arbitrary JavaScript code execution https://bugzilla.redhat.com/show_bug.cgi?id=452600 [ 2 ] Bug #452597 - CVE-2008-2798 Firefox malformed web content flaws https://bugzilla.redhat.com/show_bug.cgi?id=452597 [ 3 ] Bug #453007 - CVE-2008-2811 Firefox block reflow flaw https://bugzilla.redhat.com/show_bug.cgi?id=453007 [ 4 ] Bug #452709 - CVE-2008-2807 Firefox .properties memory leak https://bugzilla.redhat.com/show_bug.cgi?id=452709 [ 5 ] Bug #452711 - CVE-2008-2809 Firefox self signed certificate flaw https://bugzilla.redhat.com/show_bug.cgi?id=452711 [ 6 ] Bug #452602 - CVE-2008-2803 Firefox javascript arbitrary code execution https://bugzilla.redhat.com/show_bug.cgi?id=452602 [ 7 ] Bug #452598 - CVE-2008-2799 Firefox javascript arbitrary code execution https://bugzilla.redhat.com/show_bug.cgi?id=452598 [ 8 ] Bug #452204 - CVE-2008-2785 mozilla: CSS reference counter overflow (ZDI-CAN-349) https://bugzilla.redhat.com/show_bug.cgi?id=452204
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update thunderbird' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-6706
Risk factor : Critical
CVSS Score: 10.0
|