Lucene search

K
centosCentOS ProjectCESA-2008:0224
HistoryMay 01, 2008 - 10:31 p.m.

thunderbird security update

2008-05-0122:31:15
CentOS Project
lists.centos.org
53

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.06

Percentile

93.6%

CentOS Errata and Security Advisory CESA-2008:0224

Mozilla Thunderbird is a standalone mail and newsgroup client.

A flaw was found in the processing of malformed JavaScript content. An HTML
mail message containing such malicious content could cause Thunderbird to
crash or, potentially, execute arbitrary code as the user running
Thunderbird. (CVE-2008-1380)

Note: JavaScript support is disabled by default in Thunderbird; the above
issue is not exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to these updated packages, which
contain backported patches to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-May/077040.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077041.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077044.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077045.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077054.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077058.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0224

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.06

Percentile

93.6%