![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.842545 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-2819-1) |
Summary: | The remote host is missing an update for the 'thunderbird' package(s) announced via the USN-2819-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'thunderbird' package(s) announced via the USN-2819-1 advisory. Vulnerability Insight: Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, and Gary Kwong discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-4513) Tyson Smith and David Keeler discovered a use-after-poison and buffer overflow in NSS. An attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7181, CVE-2015-7182) Ryan Sleevi discovered an integer overflow in NSPR. An attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7183) Michal Bentkowski discovered that adding white-space to hostnames that are IP addresses can bypass same-origin protections. If a user were tricked in to opening a specially crafted website in a browser-like context, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2015-7188) Looben Yang discovered a buffer overflow during script interactions with the canvas element in some circumstances. If a user were tricked in to opening a specially crafted website in a browser-like context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7189) Shinto K Anto discovered that CORS preflight is bypassed when receiving non-standard Content-Type headers in some circumstances. If a user were tricked in to opening a specially crafted website in a browser-like context, an attacker could potentially exploit this to bypass same-origin restrictions. (CVE-2015-7193) Gustavo Grieco discovered a buffer overflow in libjar in some circumstances. If a user were tricked in to opening a specially crafted website in a browser-like context, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-7194) Ehsan Akhgari discovered a mechanism for a web worker to bypass secure requirements for web sockets. If a user were tricked in to opening a specially crafted website in a browser-like context, an attacker could exploit this to bypass the mixed content web socket policy. (CVE-2015-7197) Ronald Crane discovered several vulnerabilities through code-inspection. If a user were tricked in to opening a specially crafted website in a browser-like context, an attacker could potentially exploit these to cause a denial of ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'thunderbird' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 15.04, Ubuntu 15.10. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-4513 BugTraq ID: 77411 http://www.securityfocus.com/bid/77411 Debian Security Information: DSA-3393 (Google Search) http://www.debian.org/security/2015/dsa-3393 Debian Security Information: DSA-3410 (Google Search) http://www.debian.org/security/2015/dsa-3410 https://security.gentoo.org/glsa/201512-10 RedHat Security Advisories: RHSA-2015:1982 http://rhn.redhat.com/errata/RHSA-2015-1982.html RedHat Security Advisories: RHSA-2015:2519 http://rhn.redhat.com/errata/RHSA-2015-2519.html http://www.securitytracker.com/id/1034069 SuSE Security Announcement: SUSE-SU-2015:1926 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html SuSE Security Announcement: SUSE-SU-2015:1978 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html SuSE Security Announcement: SUSE-SU-2015:1981 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html SuSE Security Announcement: SUSE-SU-2015:2081 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html SuSE Security Announcement: openSUSE-SU-2015:1942 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html SuSE Security Announcement: openSUSE-SU-2015:2229 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html SuSE Security Announcement: openSUSE-SU-2015:2245 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html http://www.ubuntu.com/usn/USN-2785-1 http://www.ubuntu.com/usn/USN-2819-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-7181 BugTraq ID: 77416 http://www.securityfocus.com/bid/77416 BugTraq ID: 91787 http://www.securityfocus.com/bid/91787 Debian Security Information: DSA-3688 (Google Search) http://www.debian.org/security/2016/dsa-3688 https://security.gentoo.org/glsa/201605-06 http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html RedHat Security Advisories: RHSA-2015:1980 http://rhn.redhat.com/errata/RHSA-2015-1980.html RedHat Security Advisories: RHSA-2015:1981 http://rhn.redhat.com/errata/RHSA-2015-1981.html http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753 http://www.ubuntu.com/usn/USN-2791-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-7182 Common Vulnerability Exposure (CVE) ID: CVE-2015-7183 BugTraq ID: 77415 http://www.securityfocus.com/bid/77415 Debian Security Information: DSA-3406 (Google Search) http://www.debian.org/security/2015/dsa-3406 http://www.ubuntu.com/usn/USN-2790-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-7188 Common Vulnerability Exposure (CVE) ID: CVE-2015-7189 Common Vulnerability Exposure (CVE) ID: CVE-2015-7193 Common Vulnerability Exposure (CVE) ID: CVE-2015-7194 Common Vulnerability Exposure (CVE) ID: CVE-2015-7197 Common Vulnerability Exposure (CVE) ID: CVE-2015-7198 Common Vulnerability Exposure (CVE) ID: CVE-2015-7199 Common Vulnerability Exposure (CVE) ID: CVE-2015-7200 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |