Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2005-604: thunderbird


Vulnerability Assessment Details

Fedora Core 3 2005-604: thunderbird

Vulnerability Assessment Summary
Check for the version of the thunderbird package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-604 (thunderbird).

Mozilla Thunderbird is a standalone mail and newsgroup client.


Users of Thunderbird are advised to upgrade to this updated package
that contains Thunderbird version 1.0.6 and is not vulnerable to these
issues.


Solution : http://www.fedoranews.org/blog/index.php?p=778
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

528pg Personal Computer History MITS Altair PDP-8 Kenbak-1 Xerox PARC Steve Jobs
$32.0
528pg Personal Computer History MITS Altair PDP-8 Kenbak-1 Xerox PARC Steve Jobs picture500+pg History of the Personal Computer Altair 8800 IBM 5100 Apple 1 Lisa Mark-8
$32.0
500+pg History of the Personal Computer Altair 8800 IBM 5100 Apple 1 Lisa Mark-8 pictureRARE Micro Sourcebook Altair 8800 Era S-100 Boards Paper Tape Peripherals IMSAI
$55.0
RARE Micro Sourcebook Altair 8800 Era S-100 Boards Paper Tape Peripherals IMSAI pictureHomebrew S-100 Computer Design IMSAI 8080 Z80 ADM-3A DEC LSI-11 Altair 8800 Bus
$36.0
Homebrew S-100 Computer Design IMSAI 8080 Z80 ADM-3A DEC LSI-11 Altair 8800 Bus picture


Discussions

No Discussions have been posted on this vulnerability.