Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the mozilla-thunderbird package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory MDKSA-2005:174 (mozilla-thunderbird).
Updated Mozilla Thunderbird packages fix various vulnerabilities:
The run-mozilla.sh script, with debugging enabled, would permit local users to
create or overwrite arbitrary files via a symlink attack on temporary files
A bug in the way Thunderbird processes XBM images could be used to execute
arbitrary code via a specially crafted XBM image file (CVE-2005-2701).
A bug in the way Thunderbird handles certain Unicode sequences could be used to
execute arbitrary code via viewing a specially crafted Unicode sequence
A bug in the way Thunderbird makes XMLHttp requests could be abused by a
malicious web page to exploit other proxy or server flaws from the victim's
however, the default behaviour of the browser is to dispermit this
A bug in the way Thunderbird implemented its XBL interface could be abused by a
malicious web page to create an XBL binding in such a way as to permit arbitrary
certain conditions to permit a malicious web page to execute arbitrary code
A bug in the way Thunderbird displays about: pages could be used to execute
A bug in the way Thunderbird opens new windows could be used by a malicious web
page to construct a new window without any user interface elements (such as
address bar and status bar) that could be used to potentially mislead the user
A bug in the way Thunderbird proceesed URLs on the command line could be used
to execute arbitary commands as the user running Thunderbird
this could be
abused by clicking on a supplied link, such as from an instant messaging client
Tom Ferris reported that Thunderbird would crash when processing a domain name
consisting solely of soft-hyphen characters due to a heap overflow when IDN
processing results in an empty string after removing non-wrapping chracters,
such as soft-hyphens. This could be exploited to run or or install malware on
the user's computer (CVE-2005-2871).
The updated packages have been patched to correct these issues.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:174
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|Innowell UREN URN-URENV1 Expansion Input Output Port Very Rare
|FUJITSU XG700-CX4 10GB 12-PORT ETHERNET SWITCH -
|CISCO VIC3-4FXS/DID INTERFACE MODULE CARD
|FUJITSU XG700-CX4 10GB 12-PORT ETHERNET SWITCH - BRAND NEW -
No Discussions have been posted on this vulnerability.