|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2006-0330: thunderbird Vulnerability Assessment Details
|
RHSA-2006-0330: thunderbird |
||
Check for the version of the thunderbird packages Detailed Explanation for this Vulnerability Assessment An updated thunderbird package that fixes various bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Several bugs were found in the way Thunderbird processes malformed javascript. A malicious HTML mail message could modify the content of a different open HTML mail message, possibly stealing sensitive information or conducting a cross-site scripting attack. Please note that JavaScript support is disabled by default in Thunderbird. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741) Several bugs were found in the way Thunderbird processes certain javascript actions. A malicious HTML mail message could execute arbitrary javascript instructions with the permissions of 'chrome', permiting the page to steal sensitive information or install browser malware. Please note that JavaScript support is disabled by default in Thunderbird. (CVE-2006-0292, CVE-2006-0296, CVE-2006-1727, CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742) Several bugs were found in the way Thunderbird processes malformed HTML mail messages. A carefully crafted malicious HTML mail message could cause the execution of arbitrary code as the user running Thunderbird. (CVE-2006-0749, CVE-2006-1724, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) A bug was found in the way Thunderbird processes certain inline content in HTML mail messages. It may be possible for a remote attacker to send a carefully crafted mail message to the victim, which will fetch remote content, even if Thunderbird is configured not to fetch remote content. (CVE-2006-1045) Users of Thunderbird are advised to upgrade to this updated package containing Thunderbird version 1.0.8, which is not vulnerable to these issues. Solution : http://rhn.redhat.com/errata/RHSA-2006-0330.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
CMD RAMLINK FOR COMMODORE 64 128 -
$1000.00
Commodore Vic-20 Matching Box Games Power Supply Modem And More Tested Works
$149.00
$95.00
Commodore VIC-20 Personal Color Computer In Box AS-IS/For Parts or repair
$69.99
pi1541 Disk Emulator for Commodore -
$38.95
Commodore 64/128 AV Adaptor - S-Video Composite & 2ch Audio L/R
$16.41
Commodore 1350 Mouse 1985 Untested in Box
$28.00
CUSTOM Retro Restored Commodore 64 Computer Tested Vintage 1980s C64 Plus Manual
$188.88
Commodore Floppy Disk Drive Model 1541
$52.00
DEFECT Commodore 64 64C Computer W/ Power Supply, Mouse, Joysticks, 7 Games....
$199.99
|
||
No Discussions have been posted on this vulnerability. |