RHEL 4 : thunderbird (RHSA-2006:0330)

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated thunderbird packages that fix various bugs are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the
Red Hat Security Response Team.

[Updated 24 Apr 2006] The erratum text has been updated to include the
details of additional issues that were fixed by these erratum packages
but which were not public at the time of release. No changes have been
made to the packages.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several bugs were found in the way Thunderbird processes malformed
JavaScript. A malicious HTML mail message could modify the content of
a different open HTML mail message, possibly stealing sensitive
information or conducting a cross-site scripting attack. Please note
that JavaScript support is disabled by default in Thunderbird.
(CVE-2006-1731, CVE-2006-1732, CVE-2006-1741)

Several bugs were found in the way Thunderbird processes certain
JavaScript actions. A malicious HTML mail message could execute
arbitrary JavaScript instructions with the permissions of 'chrome',
allowing the page to steal sensitive information or install browser
malware. Please note that JavaScript support is disabled by default in
Thunderbird. (CVE-2006-0292, CVE-2006-0296, CVE-2006-1727,
CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735,
CVE-2006-1742)

Several bugs were found in the way Thunderbird processes malformed
HTML mail messages. A carefully crafted malicious HTML mail message
could cause the execution of arbitrary code as the user running
Thunderbird. (CVE-2006-0748, CVE-2006-0749, CVE-2006-1724,
CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739,
CVE-2006-1790)

A bug was found in the way Thunderbird processes certain inline
content in HTML mail messages. It may be possible for a remote
attacker to send a carefully crafted mail message to the victim, which
will fetch remote content, even if Thunderbird is configured not to
fetch remote content. (CVE-2006-1045)

A bug was found in the way Thunderbird executes in-line mail
forwarding. If a user can be tricked into forwarding a maliciously
crafted mail message as in-line content, it is possible for the
message to execute JavaScript with the permissions of 'chrome'.
(CVE-2006-0884)

Users of Thunderbird are advised to upgrade to these updated packages
containing Thunderbird version 1.0.8, which is not vulnerable to these
issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2006-0292.html
https://www.redhat.com/security/data/cve/CVE-2006-0296.html
https://www.redhat.com/security/data/cve/CVE-2006-0748.html
https://www.redhat.com/security/data/cve/CVE-2006-0749.html
https://www.redhat.com/security/data/cve/CVE-2006-0884.html
https://www.redhat.com/security/data/cve/CVE-2006-1045.html
https://www.redhat.com/security/data/cve/CVE-2006-1724.html
https://www.redhat.com/security/data/cve/CVE-2006-1727.html
https://www.redhat.com/security/data/cve/CVE-2006-1728.html
https://www.redhat.com/security/data/cve/CVE-2006-1730.html
https://www.redhat.com/security/data/cve/CVE-2006-1731.html
https://www.redhat.com/security/data/cve/CVE-2006-1732.html
https://www.redhat.com/security/data/cve/CVE-2006-1733.html
https://www.redhat.com/security/data/cve/CVE-2006-1734.html
https://www.redhat.com/security/data/cve/CVE-2006-1735.html
https://www.redhat.com/security/data/cve/CVE-2006-1737.html
https://www.redhat.com/security/data/cve/CVE-2006-1738.html
https://www.redhat.com/security/data/cve/CVE-2006-1739.html
https://www.redhat.com/security/data/cve/CVE-2006-1741.html
https://www.redhat.com/security/data/cve/CVE-2006-1742.html
https://www.redhat.com/security/data/cve/CVE-2006-1790.html
http://www.mozilla.org/projects/security/known-
http://rhn.redhat.com/errata/RHSA-2006-0330.html

Solution :

Update the affected thunderbird package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)