SynopsisThe remote Slackware Linux host is missing a security update to mozilla-thunderbird.
DescriptionThe version of mozilla-thunderbird installed on the remote host is prior to 91.7.0. It is, therefore, affected by multiple vulnerabilities as referenced in the SSA:2022-068-01 advisory.
- An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. (CVE-2022-26381)
- When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
- Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behavior was reverted to the original, user-specific directory.
<br>*This bug only affects Firefox for macOS and Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.7 and Thunderbird < 91.7. (CVE-2022-26386)
- When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
SolutionUpgrade the affected mozilla-thunderbird package.
File Name: Slackware_SSA_2022-068-01.nasl
Temporal Vector: CVSS2#E:U/RL:OF/RC:C
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:slackware:slackware_linux:mozilla-thunderbird, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:15.0
Required KB Items: Host/Slackware/release, Host/local_checks_enabled, Host/Slackware/packages
Exploit Ease: No known exploits are available
Vulnerability Publication Date: 3/8/2022