RHEL 4 : thunderbird (RHSA-2006:0330)

critical Nessus Plugin ID 21288
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Red Hat host is missing a security update.

Description

Updated thunderbird packages that fix various bugs are now available for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

[Updated 24 Apr 2006] The erratum text has been updated to include the details of additional issues that were fixed by these erratum packages but which were not public at the time of release. No changes have been made to the packages.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several bugs were found in the way Thunderbird processes malformed JavaScript. A malicious HTML mail message could modify the content of a different open HTML mail message, possibly stealing sensitive information or conducting a cross-site scripting attack. Please note that JavaScript support is disabled by default in Thunderbird.
(CVE-2006-1731, CVE-2006-1732, CVE-2006-1741)

Several bugs were found in the way Thunderbird processes certain JavaScript actions. A malicious HTML mail message could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware. Please note that JavaScript support is disabled by default in Thunderbird. (CVE-2006-0292, CVE-2006-0296, CVE-2006-1727, CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742)

Several bugs were found in the way Thunderbird processes malformed HTML mail messages. A carefully crafted malicious HTML mail message could cause the execution of arbitrary code as the user running Thunderbird. (CVE-2006-0748, CVE-2006-0749, CVE-2006-1724, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1790)

A bug was found in the way Thunderbird processes certain inline content in HTML mail messages. It may be possible for a remote attacker to send a carefully crafted mail message to the victim, which will fetch remote content, even if Thunderbird is configured not to fetch remote content. (CVE-2006-1045)

A bug was found in the way Thunderbird executes in-line mail forwarding. If a user can be tricked into forwarding a maliciously crafted mail message as in-line content, it is possible for the message to execute JavaScript with the permissions of 'chrome'.
(CVE-2006-0884)

Users of Thunderbird are advised to upgrade to these updated packages containing Thunderbird version 1.0.8, which is not vulnerable to these issues.

Solution

Update the affected thunderbird package.

See Also

https://access.redhat.com/security/cve/cve-2006-0292

https://access.redhat.com/security/cve/cve-2006-0296

https://access.redhat.com/security/cve/cve-2006-0748

https://access.redhat.com/security/cve/cve-2006-0749

https://access.redhat.com/security/cve/cve-2006-0884

https://access.redhat.com/security/cve/cve-2006-1045

https://access.redhat.com/security/cve/cve-2006-1724

https://access.redhat.com/security/cve/cve-2006-1727

https://access.redhat.com/security/cve/cve-2006-1728

https://access.redhat.com/security/cve/cve-2006-1730

https://access.redhat.com/security/cve/cve-2006-1731

https://access.redhat.com/security/cve/cve-2006-1732

https://access.redhat.com/security/cve/cve-2006-1733

https://access.redhat.com/security/cve/cve-2006-1734

https://access.redhat.com/security/cve/cve-2006-1735

https://access.redhat.com/security/cve/cve-2006-1737

https://access.redhat.com/security/cve/cve-2006-1738

https://access.redhat.com/security/cve/cve-2006-1739

https://access.redhat.com/security/cve/cve-2006-1741

https://access.redhat.com/security/cve/cve-2006-1742

https://access.redhat.com/security/cve/cve-2006-1790

https://www.mozilla.org/en-US/projects/security/known-

https://access.redhat.com/errata/RHSA-2006:0330

Plugin Details

Severity: Critical

ID: 21288

File Name: redhat-RHSA-2006-0330.nasl

Version: 1.26

Type: local

Agent: unix

Published: 4/26/2006

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:thunderbird, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 4/25/2006

Vulnerability Publication Date: 2/2/2006

Reference Information

CVE: CVE-2006-0292, CVE-2006-0296, CVE-2006-0748, CVE-2006-0749, CVE-2006-0884, CVE-2006-1045, CVE-2006-1724, CVE-2006-1727, CVE-2006-1728, CVE-2006-1730, CVE-2006-1731, CVE-2006-1732, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1741, CVE-2006-1742, CVE-2006-1790

RHSA: 2006:0330

CWE: 20, 79, 119, 189, 264, 399