openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-2252)

high Nessus Plugin ID 27127

Synopsis

The remote openSUSE host is missing a security update.

Description

This security update brings Mozilla Thunderbird to version 1.5.0.8.

More Details can be found on this page:
http://www.mozilla.org/projects/security/known-vulnerabilities.html

It includes fixes to the following security problems :

MFSA2006-65: Is split into 3 sub-entries, for ongoing stability improvements in the Mozilla browsers: CVE-2006-5464: Layout engine flaws were fixed. CVE-2006-5747: A xml.prototype.hasOwnProperty flaw was fixed. CVE-2006-5748: Fixes were applied to the JavaScript engine.

MFSA2006-66/CVE-2006-5462: MFSA 2006-60 reported that RSA digital signatures with a low exponent (typically 3) could be forged. Firefox and Thunderbird 1.5.0.7, which incorporated NSS version 3.10.2, were incompletely patched and remained vulnerable to a variant of this attack.

MFSA2006-67/CVE-2006-5463: shutdown demonstrated that it was possible to modify a Script object while it was executing, potentially leading to the execution of arbitrary JavaScript bytecode.

Solution

Update the affected MozillaThunderbird packages.

See Also

http://www.mozilla.org/projects/security/known-vulnerabilities.html

Plugin Details

Severity: High

ID: 27127

File Name: suse_MozillaThunderbird-2252.nasl

Version: 1.13

Type: local

Agent: unix

Published: 10/17/2007

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:mozillathunderbird, p-cpe:/a:novell:opensuse:mozillathunderbird-translations, cpe:/o:novell:opensuse:10.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 11/11/2006

Reference Information

CVE: CVE-2006-5462, CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748