Oracle Solaris Third-Party Patch Update : thunderbird (multiple_vulnerabilities_in_thunderbird3)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- Mozilla Firefox before 3.6.23 and 4.x through 6,
Thunderbird before 7.0, and SeaMonkey before 2.4 do not
prevent the starting of a download in response to the
holding of the Enter key, which allows user-assisted
remote attackers to bypass intended access restrictions
via a crafted web site. (CVE-2011-2372)

- Multiple unspecified vulnerabilities in the browser
engine in Mozilla Firefox before 3.6.23 and 4.x through
6, Thunderbird before 7.0, and SeaMonkey before 2.4
allow remote attackers to cause a denial of service
(memory corruption and application crash) or possibly
execute arbitrary code via unknown vectors.
(CVE-2011-2995)

- Multiple unspecified vulnerabilities in the browser
engine in Mozilla Firefox 6, Thunderbird before 7.0, and
SeaMonkey before 2.4 allow remote attackers to cause a
denial of service (memory corruption and application
crash) or possibly execute arbitrary code via unknown
vectors. (CVE-2011-2997)

- Integer underflow in Mozilla Firefox 3.6.x before 3.6.23
allows remote attackers to cause a denial of service
(application crash) or possibly execute arbitrary code
via JavaScript code containing a large RegExp
expression. (CVE-2011-2998)

- Mozilla Firefox before 3.6.23 and 4.x through 5,
Thunderbird before 6.0, and SeaMonkey before 2.3 do not
properly handle 'location' as the name of a frame, which
allows remote attackers to bypass the Same Origin Policy
via a crafted web site, a different vulnerability than
CVE-2010-0170. (CVE-2011-2999)

- Mozilla Firefox before 3.6.23 and 4.x through 6,
Thunderbird before 7.0, and SeaMonkey before 2.4 do not
properly handle HTTP responses that contain multiple
Location, Content-Length, or Content-Disposition
headers, which makes it easier for remote attackers to
conduct HTTP response splitting attacks via crafted
header values. (CVE-2011-3000)

- Mozilla Firefox 4.x through 6, Thunderbird before 7.0,
and SeaMonkey before 2.4 do not prevent manual add-on
installation in response to the holding of the Enter
key, which allows user-assisted remote attackers to
bypass intended access restrictions via a crafted web
site that triggers an unspecified internal error.
(CVE-2011-3001)

- Use-after-free vulnerability in Mozilla Firefox 4.x
through 6, Thunderbird before 7.0, and SeaMonkey before
2.4 allows remote attackers to cause a denial of service
(application crash) or possibly execute arbitrary code
via crafted OGG headers in a .ogg file. (CVE-2011-3005)

- YARR, as used in Mozilla Firefox before 7.0, Thunderbird
before 7.0, and SeaMonkey before 2.4, allows remote
attackers to cause a denial of service (application
crash) or possibly execute arbitrary code via crafted
JavaScript. (CVE-2011-3232)

See also :

http://www.nessus.org/u?b5f8def1
http://www.nessus.org/u?5e75a35f

Solution :

Upgrade to Solaris 11/11 SRU 2.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80784 ()

Bugtraq ID:

CVE ID: CVE-2011-2372
CVE-2011-2995
CVE-2011-2997
CVE-2011-2998
CVE-2011-2999
CVE-2011-3000
CVE-2011-3001
CVE-2011-3005
CVE-2011-3232

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now