|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for thunderbird RHSA-2012:0085-01|
|Summary:||The remote host is missing an update for the 'thunderbird'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'thunderbird'
package(s) announced via the referenced advisory.
Mozilla Thunderbird is a standalone mail and newsgroup client.
A flaw was found in the processing of malformed content. An HTML mail
message containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user running
A malicious script could possibly use this flaw to gain access to sensitive
information (such as a client's IP and user e-mail address, or httpOnly cookies)
that may be included in HTTP proxy error replies, generated in response to
invalid URLs using square brackets. (CVE-2011-3670)
Note: The CVE-2011-3670 issue cannot be exploited by a specially-crafted
It could be exploited another way in Thunderbird, for example, when viewing
the full remote content of an RSS feed.
All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.
thunderbird on Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-3670|
Debian Security Information: DSA-2400 (Google Search)
Debian Security Information: DSA-2402 (Google Search)
Debian Security Information: DSA-2406 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:0198 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:0221 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:0234 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2012-0442
|Copyright||Copyright (C) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.