Ubuntu Security Notice (C) 2012-2014 Canonical, Inc. / NASL script (C) 2012-2014 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
USN-1400-1 fixed vulnerabilities in Firefox. This update provides the
corresponding fixes for Thunderbird.
Soroush Dalili discovered that Firefox did not adequately protect
could, through cross-site scripting (XSS), exploit this to modify the
contents or steal confidential data. (CVE-2012-0455)
Atte Kettunen discovered a use-after-free vulnerability in
Firefox's handling of SVG animations. An attacker could
potentially exploit this to execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2012-0457)
Atte Kettunen discovered an out of bounds read vulnerability
in Firefox's handling of SVG Filters. An attacker could
potentially exploit this to make data from the user's memory
accessible to the page content. (CVE-2012-0456)
Mike Brooks discovered that using carriage return line feed
(CRLF) injection, one could introduce a new Content Security
Policy (CSP) rule which allows for cross-site scripting
(XSS) on sites with a separate header injection
vulnerability. With cross-site scripting vulnerabilities, if
a user were tricked into viewing a specially crafted page, a
remote attacker could exploit this to modify the contents,
or steal confidential data, within the same domain.
Mariusz Mlynski discovered that the Home button accepted
could use this vulnerability to get the script URL loaded in
the privileged about:sessionrestore context. (CVE-2012-0458)
Daniel Glazman discovered that the Cascading Style Sheets
(CSS) implementation is vulnerable to crashing due to
modification of a keyframe followed by access to the cssText
of the keyframe. If the user were tricked into opening a
specially crafted web page, an attacker could exploit this
to cause a denial of service via application crash, or
potentially execute code with the privileges of the user
invoking Firefox. (CVE-2012-0459)
Matt Brubeck discovered that Firefox did not properly
restrict access to the window.fullScreen object. If the user
were tricked into opening a specially crafted web page, an
attacker could potentially use this vulnerability to spoof
the user interface. (CVE-2012-0460)
Bob Clary, Christian Holler, Jesse Ruderman, Michael
Bebenita, David Anderson, Jeff Walden, Vincenzo Iozzo, and
Willem Pinckaers discovered memory safety issues affecting
Firefox. If the user were tricked into opening a specially
crafted page, an attacker could exploit these to cause a
denial of service via application crash, or potentially
execute code with the privileges of the user invoking
Firefox. (CVE-2012-0461, CVE-2012-0462, CVE-2012-0464).
Update the affected thunderbird package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 58425 ()
Bugtraq ID: 52456524575245852459524605246152463524645246552467
CVE ID: CVE-2012-0451CVE-2012-0455CVE-2012-0456CVE-2012-0457CVE-2012-0458CVE-2012-0459CVE-2012-0460CVE-2012-0461CVE-2012-0462CVE-2012-0464
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.