Ubuntu Security Notice (C) 2008-2016 Canonical, Inc. / NASL script (C) 2008-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
Various flaws were discovered in the browser engine. If a user had
an attacker could cause a denial of service via application crash, or
possibly execute arbitrary code with the privileges of the user
invoking the program. (CVE-2008-2798, CVE-2008-2799)
It was discovered that Thunderbird would allow non-privileged XUL
was enabled. This could allow an attacker to execute arbitrary
A flaw was discovered in Thunderbird that allowed overwriting trusted
objects via mozIJSSubScriptLoader.loadSubScript(). If a user had
an attacker could execute arbitrary code with the privileges of the
user invoking the program. (CVE-2008-2803)
Daniel Glazman found that an improperly encoded .properties file in an
add-on can result in uninitialized memory being used. If a user were
tricked into installing a malicious add-on, Thunderbird may be able to
see data from other programs. (CVE-2008-2807)
John G. Myers discovered a weakness in the trust model used by
Thunderbird regarding alternate names on self-signed certificates. If
a user were tricked into accepting a certificate containing alternate
name entries, an attacker could impersonate another server.
A vulnerability was discovered in the block reflow code of
used by an attacker to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user
invoking the program. (CVE-2008-2811)
A flaw was discovered in the browser engine. A variable could be made
and was tricked into opening a malicious web page, an attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. (CVE-2008-2785)
Mozilla developers audited the MIME handling code looking for similar
vulnerabilities to the previously fixed CVE-2008-0304, and changed
several function calls to use safer versions of string routines.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.8
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 33587 ()
Bugtraq ID: 2980230038
CVE ID: CVE-2008-0304CVE-2008-2785CVE-2008-2798CVE-2008-2799CVE-2008-2802CVE-2008-2803CVE-2008-2807CVE-2008-2809CVE-2008-2811
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.