Lucene search

K
centosCentOS ProjectCESA-2007:0723
HistoryJul 19, 2007 - 7:16 p.m.

thunderbird security update

2007-07-1919:16:54
CentOS Project
lists.centos.org
55

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.949 High

EPSS

Percentile

99.3%

CentOS Errata and Security Advisory CESA-2007:0723

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the way Thunderbird processed certain malformed
JavaScript code. A malicious HTML email message containing JavaScript code
could cause Thunderbird to crash or potentially execute arbitrary code as
the user running Thunderbird. JavaScript support is disabled by default in
Thunderbird; these issues are not exploitable unless the user has enabled
JavaScript. (CVE-2007-3089, CVE-2007-3734, CVE-2007-3735, CVE-2007-3736,
CVE-2007-3737, CVE-2007-3738)

Users of Thunderbird are advised to upgrade to these erratum packages,
which contain backported patches that correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-July/076216.html
https://lists.centos.org/pipermail/centos-announce/2007-July/076217.html
https://lists.centos.org/pipermail/centos-announce/2007-July/076218.html
https://lists.centos.org/pipermail/centos-announce/2007-July/076219.html
https://lists.centos.org/pipermail/centos-announce/2007-July/076227.html
https://lists.centos.org/pipermail/centos-announce/2007-July/076234.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2007:0723

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.949 High

EPSS

Percentile

99.3%