Lucene search

K
centosCentOS ProjectCESA-2011:1438
HistoryNov 09, 2011 - 8:49 p.m.

thunderbird security update

2011-11-0920:49:13
CentOS Project
lists.centos.org
53

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.002

Percentile

61.1%

CentOS Errata and Security Advisory CESA-2011:1438

Mozilla Thunderbird is a standalone mail and newsgroup client.

A cross-site scripting (XSS) flaw was found in the way Thunderbird handled
certain multibyte character sets. Malicious, remote content could cause
Thunderbird to run JavaScript code with the permissions of different remote
content. (CVE-2011-3648)

Note: This issue cannot be exploited by a specially-crafted HTML mail
message as JavaScript is disabled by default for mail messages. It could be
exploited another way in Thunderbird, for example, when viewing the full
remote content of an RSS feed.

All Thunderbird users should upgrade to this updated package, which
resolves this issue. All running instances of Thunderbird must be restarted
for the update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-November/080345.html
https://lists.centos.org/pipermail/centos-announce/2011-November/080346.html
https://lists.centos.org/pipermail/centos-announce/2011-November/080351.html
https://lists.centos.org/pipermail/centos-announce/2011-November/080352.html

Affected packages:
thunderbird

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:1438

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.002

Percentile

61.1%