SynopsisThe remote Ubuntu host is missing one or more security-related patches.
DescriptionVladimir V. Perepelitsa discovered a bug in Thunderbird's handling of anonymous functions during regular expression string replacement. A malicious HTML email could exploit this to capture a random block of client memory. (CAN-2005-0989)
The XHTML DOM node handler did not take namespaces into account when verifying node types based on their names. For example, an XHTML email could contain an <IMG> tag with malicious contents, which would then be processed as the standard trusted HTML <img> tag. By tricking an user to view a malicious email, this could be exploited to execute attacker-specified code with the full privileges of the user.
It was discovered that some objects were not created appropriately.
This allowed malicious web content scripts to trace back the creation chain until they found a privileged object and execute code with higher privileges than allowed by the current site. (CAN-2005-2270)
Javier Fernandez-Sanguino Pena discovered that the run-mozilla.sh script created temporary files in an unsafe way when running with 'debugging' enabled. This could allow a symlink attack to create or overwrite arbitrary files with the privileges of the user invoking the program. (CAN-2005-2353)
The update for Ubuntu 4.10 (Warty Warthog) also fixes several less critical vulnerabilities which are not present in the Ubuntu 5.04 version. (MFSA-2005-02 to MFSA-2005-30; please see the following web site for details:
We apologize for the huge delay of this update; we changed our update strategy for Mozilla products to make sure that such long delays will not happen again.
Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected packages.