![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.882928 |
Category: | CentOS Local Security Checks |
Title: | CentOS Update for thunderbird CESA-2018:2251 centos6 |
Summary: | Check the version of thunderbird |
Description: | Summary: Check the version of thunderbird Vulnerability Insight: Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.9.1. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) * Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) * Mozilla: Use-after-free using focus() (CVE-2018-12360) * Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) * Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) * Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) * thunderbird: S/MIME and PGP decryption oracles can be built with HTML emails (CVE-2018-12372) * thunderbird: S/MIME plaintext can be leaked through HTML reply/forward (CVE-2018-12373) * Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) * Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366) * thunderbird: Using form to exfiltrate encrypted mail part by pressing enter in form field (CVE-2018-12374) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the original reporters. Affected Software/OS: thunderbird on CentOS 6 Solution: Please install the updated packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-5188 BugTraq ID: 104555 http://www.securityfocus.com/bid/104555 Debian Security Information: DSA-4244 (Google Search) https://www.debian.org/security/2018/dsa-4244 https://security.gentoo.org/glsa/201810-01 https://security.gentoo.org/glsa/201811-13 https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html RedHat Security Advisories: RHSA-2018:2112 https://access.redhat.com/errata/RHSA-2018:2112 RedHat Security Advisories: RHSA-2018:2113 https://access.redhat.com/errata/RHSA-2018:2113 RedHat Security Advisories: RHSA-2018:2251 https://access.redhat.com/errata/RHSA-2018:2251 RedHat Security Advisories: RHSA-2018:2252 https://access.redhat.com/errata/RHSA-2018:2252 https://usn.ubuntu.com/3705-1/ https://usn.ubuntu.com/3714-1/ https://usn.ubuntu.com/3749-1/ Common Vulnerability Exposure (CVE) ID: CVE-2018-12359 Debian Security Information: DSA-4235 (Google Search) https://www.debian.org/security/2018/dsa-4235 http://www.securitytracker.com/id/1041193 Common Vulnerability Exposure (CVE) ID: CVE-2018-12360 Common Vulnerability Exposure (CVE) ID: CVE-2018-12362 BugTraq ID: 104560 http://www.securityfocus.com/bid/104560 Common Vulnerability Exposure (CVE) ID: CVE-2018-12363 Common Vulnerability Exposure (CVE) ID: CVE-2018-12364 Common Vulnerability Exposure (CVE) ID: CVE-2018-12365 Common Vulnerability Exposure (CVE) ID: CVE-2018-12366 Common Vulnerability Exposure (CVE) ID: CVE-2018-12372 BugTraq ID: 104613 http://www.securityfocus.com/bid/104613 Common Vulnerability Exposure (CVE) ID: CVE-2018-12373 Common Vulnerability Exposure (CVE) ID: CVE-2018-12374 |
Copyright | Copyright (C) 2018 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |