openSUSE Security Update : MozillaThunderbird (openSUSE-SU-2014:1654-1)

Medium Nessus Plugin ID 80095

Synopsis

The remote openSUSE host is missing a security update.

Description

This MozillaThunderbird update fixes several security and non security issues :

Changes in MozillaThunderbird :

- update to Thunderbird 31.3.0 (bnc#908009)

- MFSA 2014-83/CVE-2014-1587 Miscellaneous memory safety hazards

- MFSA 2014-85/CVE-2014-1590 (bmo#1087633) XMLHttpRequest crashes with some input streams

- MFSA 2014-87/CVE-2014-1592 (bmo#1088635) Use-after-free during HTML5 parsing

- MFSA 2014-88/CVE-2014-1593 (bmo#1085175) Buffer overflow while parsing media content

- MFSA 2014-89/CVE-2014-1594 (bmo#1074280) Bad casting from the BasicThebesLayer to BasicContainerLayer

- fix bashism in mozilla.sh script

- Limit RAM usage during link for ARM

- remove add-plugins.sh and use /usr/share/myspell directly (bnc#900639)

Solution

Update the affected MozillaThunderbird packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=900639

https://bugzilla.opensuse.org/show_bug.cgi?id=908009

https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html

Plugin Details

Severity: Medium

ID: 80095

File Name: openSUSE-2014-786.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2014/12/18

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:MozillaThunderbird, p-cpe:/a:novell:opensuse:MozillaThunderbird-buildsymbols, p-cpe:/a:novell:opensuse:MozillaThunderbird-debuginfo, p-cpe:/a:novell:opensuse:MozillaThunderbird-debugsource, p-cpe:/a:novell:opensuse:MozillaThunderbird-devel, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-common, p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-other, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:13.1, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2014/12/08

Reference Information

CVE: CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593, CVE-2014-1594