|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200503-32] Mozilla Thunderbird: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200503-32] Mozilla Thunderbird: Multiple vulnerabilities |
||
Mozilla Thunderbird: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200503-32 (Mozilla Thunderbird: Multiple vulnerabilities) The following vulnerabilities were found and fixed in Mozilla Thunderbird: Mark Dowd from ISS X-Force reported an exploitable heap overrun in the GIF processing of obsolete Netscape extension 2 (CVE-2005-0399) Daniel de Wildt and Gael Delalleau discovered a memory overwrite in a string library (CVE-2005-0255) Wind Li discovered a possible heap overflow in UTF8 to Unicode conversion (CVE-2005-0592) Phil Ringnalda reported a possible way to spoof Install source with user:pass@host (CVE-2005-0590) Impact The GIF heap overflow could be triggered by a malicious GIF image that would end up executing arbitrary code with the rights of the user running Thunderbird. The other overflow issues, while not thought to be exploitable, would have the same impact. Furthermore, by setting up malicious websites and convincing users to follow untrusted links, attackers may leverage the spoofing issue to trick user into installing malicious extensions. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0255 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0399 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0592 http://www.mozilla.org/projects/security/known-vulnerabilities.html Solution: All Mozilla Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.0.2" All Mozilla Thunderbird binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.0.2" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Vintage Digital Equipment DEC PDP8/E Front Control Panel Bezel - Top Rack
$499.99
Vintage Harris S550 Front Control Panel Console w/ Key, DEC PDP
$2799.00
Vintage Digital Equipment DEC Medical Systems Front Control Panel Bezel
$499.00
Vintage Digital DEC PCXAL-AA US Standard Keyboard NEW
$89.99
Vintage DEC Digital VR201 Computer Monitor AS IS Untested. Parts And Repair
$49.99
Vintage DEC Starion 960 (FR-904AA-A8) Desktop Computer Intel Pentium 166MHz
$109.98
Vintage DEC Digital Equipment VT100 Keyboard 70-14653-11 Missing Key Caps
$129.00
VTG DEC Digital RX180AB External 5.25" Dual Drive - Power Tested Only, Powers On
$125.00
Vintage DEC/The Redac mini cabinet front panel Digital Equipment Corp. 19"
$269.99
Vintage Digital DEC VT220 Terminal 54-15651 PS AND MTR BOARD (B20)
$139.99
|
||
No Discussions have been posted on this vulnerability. |