Mandriva Linux Security Advisory : mozilla-thunderbird (MDVSA-2010:071)

critical Nessus Plugin ID 45521

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been found and corrected in mozilla-thunderbird :

Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 process e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted message, related to message indexing (CVE-2009-0689).

Integer overflow in a base64 decoding function in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors (CVE-2009-2463).

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2009-3072).

Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2009-3075).

Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a dangling pointer vulnerability. (CVE-2009-3077)

Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file (CVE-2009-3376).

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user (CVE-2009-3983).

Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 process e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted message, related to message indexing (CVE-2010-0163).

This update provides the latest version of Thunderbird which are not vulnerable to these issues.

Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products.

Additionally, some packages which require so, have been rebuilt and are being provided as updates.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?280be806

http://www.nessus.org/u?390a975c

Plugin Details

Severity: Critical

ID: 45521

File Name: mandriva_MDVSA-2010-071.nasl

Version: 1.16

Type: local

Published: 4/14/2010

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:beagle, p-cpe:/a:mandriva:linux:beagle-crawl-system, p-cpe:/a:mandriva:linux:beagle-doc, p-cpe:/a:mandriva:linux:beagle-epiphany, p-cpe:/a:mandriva:linux:beagle-evolution, p-cpe:/a:mandriva:linux:beagle-gui, p-cpe:/a:mandriva:linux:beagle-gui-qt, p-cpe:/a:mandriva:linux:beagle-libs, p-cpe:/a:mandriva:linux:firefox-ext-beagle, p-cpe:/a:mandriva:linux:mozilla-thunderbird, p-cpe:/a:mandriva:linux:mozilla-thunderbird-af, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ar, p-cpe:/a:mandriva:linux:mozilla-thunderbird-be, p-cpe:/a:mandriva:linux:mozilla-thunderbird-beagle, p-cpe:/a:mandriva:linux:mozilla-thunderbird-bg, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ca, p-cpe:/a:mandriva:linux:mozilla-thunderbird-cs, p-cpe:/a:mandriva:linux:mozilla-thunderbird-da, p-cpe:/a:mandriva:linux:mozilla-thunderbird-de, p-cpe:/a:mandriva:linux:mozilla-thunderbird-el, p-cpe:/a:mandriva:linux:mozilla-thunderbird-en_GB, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ar, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ca, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-cs, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-de, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-el, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-es, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fi, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fr, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-hu, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-it, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ja, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ko, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nb, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nl, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pl, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt_BR, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ru, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-sl, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-sv, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-tr, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_CN, p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_TW, p-cpe:/a:mandriva:linux:mozilla-thunderbird-es_AR, p-cpe:/a:mandriva:linux:mozilla-thunderbird-es_ES, p-cpe:/a:mandriva:linux:mozilla-thunderbird-et, p-cpe:/a:mandriva:linux:mozilla-thunderbird-et_EE, p-cpe:/a:mandriva:linux:mozilla-thunderbird-eu, p-cpe:/a:mandriva:linux:mozilla-thunderbird-fi, p-cpe:/a:mandriva:linux:mozilla-thunderbird-fr, p-cpe:/a:mandriva:linux:mozilla-thunderbird-fy, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ga, p-cpe:/a:mandriva:linux:mozilla-thunderbird-gl, p-cpe:/a:mandriva:linux:mozilla-thunderbird-he, p-cpe:/a:mandriva:linux:mozilla-thunderbird-hu, p-cpe:/a:mandriva:linux:mozilla-thunderbird-id, p-cpe:/a:mandriva:linux:mozilla-thunderbird-is, p-cpe:/a:mandriva:linux:mozilla-thunderbird-it, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ja, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ka, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ko, p-cpe:/a:mandriva:linux:mozilla-thunderbird-lt, p-cpe:/a:mandriva:linux:mozilla-thunderbird-nb_NO, p-cpe:/a:mandriva:linux:mozilla-thunderbird-nl, p-cpe:/a:mandriva:linux:mozilla-thunderbird-nn_NO, p-cpe:/a:mandriva:linux:mozilla-thunderbird-pa_IN, p-cpe:/a:mandriva:linux:mozilla-thunderbird-pl, p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_BR, p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_PT, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ro, p-cpe:/a:mandriva:linux:mozilla-thunderbird-ru, p-cpe:/a:mandriva:linux:mozilla-thunderbird-si, p-cpe:/a:mandriva:linux:mozilla-thunderbird-sk, p-cpe:/a:mandriva:linux:mozilla-thunderbird-sq, p-cpe:/a:mandriva:linux:mozilla-thunderbird-sr, p-cpe:/a:mandriva:linux:mozilla-thunderbird-sv_SE, p-cpe:/a:mandriva:linux:mozilla-thunderbird-tr, p-cpe:/a:mandriva:linux:mozilla-thunderbird-uk, p-cpe:/a:mandriva:linux:mozilla-thunderbird-vi, p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_CN, p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_TW, p-cpe:/a:mandriva:linux:nsinstall, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/23/2010

Reference Information

CVE: CVE-2009-0689, CVE-2009-2462, CVE-2009-2463, CVE-2009-2466, CVE-2009-2470, CVE-2009-3072, CVE-2009-3075, CVE-2009-3076, CVE-2009-3077, CVE-2009-3274, CVE-2009-3376, CVE-2009-3380, CVE-2009-3979, CVE-2009-3983, CVE-2010-0159, CVE-2010-0161, CVE-2010-0163, CVE-2010-0169, CVE-2010-0171, CVE-2010-0629

BID: 39247

MDVSA: 2010:071

CWE: 16, 20, 94, 119, 189, 399