Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several security-related problems have been discovered in Mozilla and
derived programs. Some of the following problems don't exactly apply
to Mozilla Thunderbird, even though the code is present. In order to
keep the codebase in sync with upstream it has been altered
nevertheless. The Common Vulnerabilities and Exposures project
identifies the following problems:
Tom Ferris discovered a bug in the IDN hostname handling of
Mozilla that permits remote attackers to cause a denial of service
and possibly execute arbitrary code via a hostname with dashes.
A buffer overflow permits remote attackers to execute arbitrary
code via an XBM image file that ends in a large number of spaces
instead of the expected end tag.
Mats Palmgren discovered a buffer overflow in the Unicode string
parser that permits a specially crafted Unicode sequence to
overflow a buffer and cause arbitrary code to be executed.
Remote attackers could spoof HTTP headers of XML HTTP requests
via XMLHttpRequest and possibly use the client to exploit
vulnerabilities in servers or proxies.
Remote attackers could spoof DOM objects via an XBL control that
implements an internal XPCOM interface.
engine that might permit remote attackers to execute arbitrary
rights via an about: page such as about:mozilla.
Remote attackers could spawn windows without user interface
components such as the address and status bar that could be used
to conduct spoofing or phishing attacks.
Peter Zelezny discovered that shell metacharacters are not
properly escaped when they are passed to a shell script and permit
the execution of arbitrary commands, e.g. when a malicious URL is
automatically copied from another program into Mozilla as default
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your mozilla-thunderbird package.
Solution : http://www.debian.org/security/2005/dsa-868
Network Security Threat Level: High
Networks Security ID: 14784
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|aa Cisco Linksys Wireless-G USB Wireless Network WUSB54G (890552681495) 802.11g
|Cisco 5510 Series ASA5510 V04 Adaptive Security Appliance
|CISCO 3845 Intergrated Router IOS 15.1 T4 1GB Dram/128MB Flash w/ DUAL Power
|NEW Cisco AIR-AP1832I-B-K9C Aironet AP1832I Wireless Access Point 802.11ac Wave
No Discussions have been posted on this vulnerability.