openSUSE Security Update : MozillaThunderbird (openSUSE-SU-2014:0640-1)

Critical Nessus Plugin ID 75357


The remote openSUSE host is missing a security update.


This is a MozillaThunderbird update to version 24.5.0 :

- MFSA 2014-34/CVE-2014-1518 Miscellaneous memory safety hazards

- MFSA 2014-37/CVE-2014-1523 (bmo#969226) Out of bounds read while decoding JPG images

- MFSA 2014-38/CVE-2014-1524 (bmo#989183) Buffer overflow when using non-XBL object as XBL

- MFSA 2014-42/CVE-2014-1529 (bmo#987003) Privilege escalation through Web Notification API

- MFSA 2014-43/CVE-2014-1530 (bmo#895557) Cross-site scripting (XSS) using history navigations

- MFSA 2014-44/CVE-2014-1531 (bmo#987140) Use-after-free in imgLoader while resizing images

- MFSA 2014-46/CVE-2014-1532 (bmo#966006) Use-after-free in nsHostResolver

- use shipped-locales as the authoritative source for supported locales (some unsupported locales disappear from -other package)


Update the affected MozillaThunderbird packages.

See Also

Plugin Details

Severity: Critical

ID: 75357

File Name: openSUSE-2014-361.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2014/06/13

Modified: 2014/06/13

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:MozillaThunderbird, p-cpe:/a:novell:opensuse:MozillaThunderbird-buildsymbols, p-cpe:/a:novell:opensuse:MozillaThunderbird-debuginfo, p-cpe:/a:novell:opensuse:MozillaThunderbird-debugsource, p-cpe:/a:novell:opensuse:MozillaThunderbird-devel, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-common, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-other, p-cpe:/a:novell:opensuse:enigmail, p-cpe:/a:novell:opensuse:enigmail-debuginfo, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/05/02

Reference Information

CVE: CVE-2014-1518, CVE-2014-1523, CVE-2014-1524, CVE-2014-1529, CVE-2014-1530, CVE-2014-1531, CVE-2014-1532

BID: 67123, 67126, 67129, 67130, 67131, 67134, 67135, 67137