This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated thunderbird packages that fix several security bugs are now
available for Red Hat Enterprise Linux 4.
This update has been rated as having critical security impact by the
Red Hat Security Response Team.
Mozilla Thunderbird is a standalone mail and newsgroup client.
Two flaws were found in the way Thunderbird processed certain regular
expressions. A malicious HTML email could cause a crash or possibly
execute arbitrary code as the user running Thunderbird.
A flaw was found in the Thunderbird auto-update verification system.
An attacker who has the ability to spoof a victim's DNS could get
Firefox to download and install malicious code. In order to exploit
this issue an attacker would also need to get a victim to previously
accept an unverifiable certificate. (CVE-2006-4567)
malicious HTML email could crash the browser or possibly execute
arbitrary code as the user running Thunderbird. (CVE-2006-4253)
Daniel Bleichenbacher recently described an implementation error in
RSA signature verification. For RSA keys with exponent 3 it is
possible for an attacker to forge a signature that which would be
incorrectly verified by the NSS library. (CVE-2006-4340)
A flaw was found in Thunderbird that triggered when a HTML message
contained a remote image pointing to a XBL script. An attacker could
have created a carefully crafted message which would execute
A number of flaws were found in Thunderbird. A malicious HTML email
could cause a crash or possibly execute arbitrary code as the user
running Thunderbird. (CVE-2006-4571)
Users of Thunderbird are advised to upgrade to this update, which
contains Thunderbird version 126.96.36.199 that corrects these issues.
See also :
Update the affected thunderbird package.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.8
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 22359 ()
Bugtraq ID: 194881984920042
CVE ID: CVE-2006-4253CVE-2006-4340CVE-2006-4565CVE-2006-4566CVE-2006-4567CVE-2006-4570CVE-2006-4571
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.