openSUSE Security Update : MozillaThunderbird (openSUSE-SU-2013:1495-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This MozillaThunderbird update to version 24.0 fixes several security
and non-security issues :

- update to Thunderbird 24.0 (bnc#840485)

- MFSA 2013-76/CVE-2013-1718/CVE-2013-1719 Miscellaneous
memory safety hazards

- MFSA 2013-77/CVE-2013-1720 (bmo#888820) Improper state
in HTML5 Tree Builder with templates

- MFSA 2013-79/CVE-2013-1722 (bmo#893308) Use-after-free
in Animation Manager during stylesheet cloning

- MFSA 2013-80/CVE-2013-1723 (bmo#891292) NativeKey
continues handling key messages after widget is
destroyed

- MFSA 2013-81/CVE-2013-1724 (bmo#894137) Use-after-free
with select element

- MFSA 2013-82/CVE-2013-1725 (bmo#876762) Calling scope
for new JavaScript objects can lead to memory corruption

- MFSA 2013-85/CVE-2013-1728 (bmo#883686) Uninitialized
data in IonMonkey

- MFSA 2013-88/CVE-2013-1730 (bmo#851353) Compartment
mismatch re-attaching XBL-backed nodes

- MFSA 2013-89/CVE-2013-1732 (bmo#883514) Buffer overflow
with multi-column, lists, and floats

- MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871,
bmo#906301) Memory corruption involving scrolling

- MFSA 2013-91/CVE-2013-1737 (bmo#907727) User-defined
properties on DOM proxies get the wrong 'this' object

- MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897) GC
hazard with default compartments and frame chain
restoration

- moved greek to common translation package

- require NSPR 4.10 and NSS 3.15.1

- add GStreamer build requirements for Gecko

- added enigmail-build.patch to fix TB packaging
(bmo#886095)

- removed obsolete patches :

- enigmail-old-gcc.patch

- mozilla-gcc43-enums.patch

- mozilla-gcc43-template_hacks.patch

- mozilla-gcc43-templates_instantiation.patch

- ppc-xpcshell.patch

See also :

http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html
https://bugzilla.novell.com/show_bug.cgi?id=840485

Solution :

Update the affected MozillaThunderbird packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now