Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.884225
Category:CentOS Local Security Checks
Title:CentOS: Security Advisory for thunderbird (CESA-2022:5480)
Summary:The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2022:5480 advisory.
Description:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the CESA-2022:5480 advisory.

Vulnerability Insight:
Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 91.11.

Security Fix(es):

* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via
retargeted javascript: URI (CVE-2022-34468)

* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470)

* Mozilla: A popup window could be resized in a way to overlay the address
bar with web content (CVE-2022-34479)

* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
(CVE-2022-34484)

* Mozilla: Undesired attributes could be set as part of prototype pollution
(CVE-2022-2200)

* Mozilla: An email with a mismatching OpenPGP signature date was accepted
as valid (CVE-2022-2226)

* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744)

* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked
(CVE-2022-34472)

* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'thunderbird' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-2200
https://bugzilla.mozilla.org/show_bug.cgi?id=1771381
https://www.mozilla.org/security/advisories/mfsa2022-24/
https://www.mozilla.org/security/advisories/mfsa2022-25/
https://www.mozilla.org/security/advisories/mfsa2022-26/
Common Vulnerability Exposure (CVE) ID: CVE-2022-2226
https://bugzilla.mozilla.org/show_bug.cgi?id=1775441
Common Vulnerability Exposure (CVE) ID: CVE-2022-31744
https://bugzilla.mozilla.org/show_bug.cgi?id=1757604
https://www.mozilla.org/security/advisories/mfsa2022-20/
Common Vulnerability Exposure (CVE) ID: CVE-2022-34468
https://bugzilla.mozilla.org/show_bug.cgi?id=1768537
Common Vulnerability Exposure (CVE) ID: CVE-2022-34470
https://bugzilla.mozilla.org/show_bug.cgi?id=1765951
Common Vulnerability Exposure (CVE) ID: CVE-2022-34472
https://bugzilla.mozilla.org/show_bug.cgi?id=1770123
Common Vulnerability Exposure (CVE) ID: CVE-2022-34479
https://bugzilla.mozilla.org/show_bug.cgi?id=1745595
Common Vulnerability Exposure (CVE) ID: CVE-2022-34481
https://bugzilla.mozilla.org/show_bug.cgi?id=1497246
Common Vulnerability Exposure (CVE) ID: CVE-2022-34484
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.