openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-5095)

High Nessus Plugin ID 31620

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote openSUSE host is missing a security update.

Description

This update brings Mozilla Thunderbird to security fix level of version 2.0.0.12

Following security problems were fixed :

- MFSA 2008-11/CVE-2008-0594 Web forgery overwrite with div overlay

- MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect

- MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files

- MFSA 2008-08/CVE-2008-0591 File action dialog tampering

- MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing

- MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI

- MFSA 2008-04/CVE-2008-0417 Stored password corruption

- MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution

- MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities

- MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12)

Solution

Update the affected MozillaThunderbird packages.

Plugin Details

Severity: High

ID: 31620

File Name: suse_MozillaThunderbird-5095.nasl

Version: 1.11

Type: local

Agent: unix

Published: 2008/03/19

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:MozillaThunderbird, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations, cpe:/o:novell:opensuse:10.1, cpe:/o:novell:opensuse:10.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2008/03/12

Reference Information

CVE: CVE-2008-0412, CVE-2008-0414, CVE-2008-0415, CVE-2008-0417, CVE-2008-0418, CVE-2008-0419, CVE-2008-0591, CVE-2008-0592, CVE-2008-0593, CVE-2008-0594

CWE: 20, 22, 79, 94, 200, 399