Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2006-0330: thunderbird


Vulnerability Assessment Details

RHSA-2006-0330: thunderbird

Vulnerability Assessment Summary
Check for the version of the thunderbird packages

Detailed Explanation for this Vulnerability Assessment


An updated thunderbird package that fixes various bugs is now available for
Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several bugs were found in the way Thunderbird processes malformed
javascript. A malicious HTML mail message could modify the content of a
different open HTML mail message, possibly stealing sensitive information
or conducting a cross-site scripting attack. Please note that JavaScript
support is disabled by default in Thunderbird. (CVE-2006-1731,
CVE-2006-1732, CVE-2006-1741)

Several bugs were found in the way Thunderbird processes certain
javascript actions. A malicious HTML mail message could execute arbitrary
javascript instructions with the permissions of 'chrome', permiting the
page to steal sensitive information or install browser malware. Please
note that JavaScript support is disabled by default in Thunderbird.
(CVE-2006-0292, CVE-2006-0296, CVE-2006-1727, CVE-2006-1728, CVE-2006-1733,
CVE-2006-1734, CVE-2006-1735, CVE-2006-1742)

Several bugs were found in the way Thunderbird processes malformed HTML
mail messages. A carefully crafted malicious HTML mail message could
cause the execution of arbitrary code as the user running Thunderbird.
(CVE-2006-0749, CVE-2006-1724, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738,
CVE-2006-1739, CVE-2006-1790)

A bug was found in the way Thunderbird processes certain inline content
in HTML mail messages. It may be possible for a remote attacker to send a
carefully crafted mail message to the victim, which will fetch remote
content, even if Thunderbird is configured not to fetch remote content.
(CVE-2006-1045)

Users of Thunderbird are advised to upgrade to this updated package
containing Thunderbird version 1.0.8, which is not vulnerable to these
issues.




Solution : http://rhn.redhat.com/errata/RHSA-2006-0330.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Netgear 108 Mbps Wireless Firewall Router WGT624
$15.0
Netgear 108 Mbps Wireless Firewall Router WGT624 pictureSonicwall TZ 210 Network Security Appliance APL20-063 w/ power supply
$75.0
Sonicwall TZ 210 Network Security Appliance APL20-063 w/ power supply pictureNokia N800956001 B Firewall Module BackPlane Board N800960001 REV A
$25.97
Nokia N800956001 B Firewall Module BackPlane Board N800960001 REV A pictureNokia N480005001 3854-23-1 Magnetek 230W Firewall Power Supply Unit / PSU
$67.78
Nokia N480005001 3854-23-1 Magnetek 230W Firewall Power Supply Unit / PSU picture


Discussions

No Discussions have been posted on this vulnerability.