Ubuntu Security Notice (C) 2008-2014 Canonical, Inc. / NASL script (C) 2009-2014 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Georgi Guninski, Michal Zalewsk and Chris Evans discovered that the
same-origin check in Thunderbird could be bypassed. If a user were
tricked into opening a malicious website, an attacker could obtain
private information from data stored in the images, or discover
information about software on the user's computer. (CVE-2008-5012)
Jesse Ruderman discovered that Thunderbird did not properly guard
tricked into opening malicious web content, an attacker could cause a
browser crash and possibly execute arbitrary code with user
an attacker to crash Thunderbird and possibly execute arbitrary code
with user privileges. (CVE-2008-5016, CVE-2008-5017, CVE-2008-5018)
A flaw was discovered in Thunderbird's DOM constructing code. If a
user were tricked into opening a malicious website while having
potentially execute arbitrary code with user privileges.
It was discovered that the same-origin check in Thunderbird could be
the context of a different website. (CVE-2008-5022)
Chris Evans discovered that Thunderbird did not properly parse E4X
documents, leading to quote characters in the namespace not being
properly escaped. (CVE-2008-5024)
Boris Zbarsky discovered that Thunderbird did not properly process
enabled and opened a malicious email, an attacker may be able to
obtain information about the recipient.
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 37649 ()
Bugtraq ID: 32281
CVE ID: CVE-2008-5012CVE-2008-5014CVE-2008-5016CVE-2008-5017CVE-2008-5018CVE-2008-5021CVE-2008-5022CVE-2008-5024
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.