[RHSA-2012:1211] thunderbird security update

Severity Critical
Affected Packages 4
CVEs 23

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2012-1970,
CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,
CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)

Content containing a malicious Scalable Vector Graphics (SVG) image file
could cause Thunderbird to crash or, potentially, execute arbitrary code
with the privileges of the user running Thunderbird. (CVE-2012-3969,
CVE-2012-3970)

Two flaws were found in the way Thunderbird rendered certain images using
WebGL. Malicious content could cause Thunderbird to crash or, under certain
conditions, possibly execute arbitrary code with the privileges of the user
running Thunderbird. (CVE-2012-3967, CVE-2012-3968)

A flaw was found in the way Thunderbird decoded embedded bitmap images in
Icon Format (ICO) files. Content containing a malicious ICO file could
cause Thunderbird to crash or, under certain conditions, possibly execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2012-3966)

A flaw was found in the way the "eval" command was handled by the
Thunderbird Error Console. Running "eval" in the Error Console while
viewing malicious content could possibly cause Thunderbird to execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2012-3980)

An out-of-bounds memory read flaw was found in the way Thunderbird used the
format-number feature of XSLT (Extensible Stylesheet Language
Transformations). Malicious content could possibly cause an information
leak, or cause Thunderbird to crash. (CVE-2012-3972)

A flaw was found in the location object implementation in Thunderbird.
Malicious content could use this flaw to possibly allow restricted content
to be loaded. (CVE-2012-3978)

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John
Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Frédéric
Hoguin, miaubiz, Arthur Gerkis, Nicolas Grégoire, moz_bug_r_a4, and Colby
Russell as the original reporters of these issues.

Note: All issues except CVE-2012-3969 and CVE-2012-3970 cannot be exploited
by a specially-crafted HTML mail message as JavaScript is disabled by
default for mail messages. They could be exploited another way in
Thunderbird, for example, when viewing the full remote content of an RSS
feed.

All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 10.0.7 ESR, which corrects these issues. After
installing the update, Thunderbird must be restarted for the changes to
take effect.

ID
RHSA-2012:1211
Severity
critical
URL
https://access.redhat.com/errata/RHSA-2012:1211
Published
2012-08-29T00:00:00
(12 years ago)
Modified
2012-08-29T00:00:00
(12 years ago)
Rights
Copyright 2012 Red Hat, Inc.
Other Advisories
Source # ID Name URL
Bugzilla 851909 https://bugzilla.redhat.com/851909
Bugzilla 851910 https://bugzilla.redhat.com/851910
Bugzilla 851918 https://bugzilla.redhat.com/851918
Bugzilla 851920 https://bugzilla.redhat.com/851920
Bugzilla 851922 https://bugzilla.redhat.com/851922
Bugzilla 851924 https://bugzilla.redhat.com/851924
Bugzilla 851937 https://bugzilla.redhat.com/851937
Bugzilla 851939 https://bugzilla.redhat.com/851939
RHSA RHSA-2012:1211 https://access.redhat.com/errata/RHSA-2012:1211
CVE CVE-2012-1970 https://access.redhat.com/security/cve/CVE-2012-1970
CVE CVE-2012-1972 https://access.redhat.com/security/cve/CVE-2012-1972
CVE CVE-2012-1973 https://access.redhat.com/security/cve/CVE-2012-1973
CVE CVE-2012-1974 https://access.redhat.com/security/cve/CVE-2012-1974
CVE CVE-2012-1975 https://access.redhat.com/security/cve/CVE-2012-1975
CVE CVE-2012-1976 https://access.redhat.com/security/cve/CVE-2012-1976
CVE CVE-2012-3956 https://access.redhat.com/security/cve/CVE-2012-3956
CVE CVE-2012-3957 https://access.redhat.com/security/cve/CVE-2012-3957
CVE CVE-2012-3958 https://access.redhat.com/security/cve/CVE-2012-3958
CVE CVE-2012-3959 https://access.redhat.com/security/cve/CVE-2012-3959
CVE CVE-2012-3960 https://access.redhat.com/security/cve/CVE-2012-3960
CVE CVE-2012-3961 https://access.redhat.com/security/cve/CVE-2012-3961
CVE CVE-2012-3962 https://access.redhat.com/security/cve/CVE-2012-3962
CVE CVE-2012-3963 https://access.redhat.com/security/cve/CVE-2012-3963
CVE CVE-2012-3964 https://access.redhat.com/security/cve/CVE-2012-3964
CVE CVE-2012-3966 https://access.redhat.com/security/cve/CVE-2012-3966
CVE CVE-2012-3967 https://access.redhat.com/security/cve/CVE-2012-3967
CVE CVE-2012-3968 https://access.redhat.com/security/cve/CVE-2012-3968
CVE CVE-2012-3969 https://access.redhat.com/security/cve/CVE-2012-3969
CVE CVE-2012-3970 https://access.redhat.com/security/cve/CVE-2012-3970
CVE CVE-2012-3972 https://access.redhat.com/security/cve/CVE-2012-3972
CVE CVE-2012-3978 https://access.redhat.com/security/cve/CVE-2012-3978
CVE CVE-2012-3980 https://access.redhat.com/security/cve/CVE-2012-3980
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/thunderbird?arch=x86_64&distro=redhat-6.3 redhat thunderbird < 10.0.7-1.el6_3 redhat-6.3 x86_64
Affected pkg:rpm/redhat/thunderbird?arch=s390x&distro=redhat-6.3 redhat thunderbird < 10.0.7-1.el6_3 redhat-6.3 s390x
Affected pkg:rpm/redhat/thunderbird?arch=ppc64&distro=redhat-6.3 redhat thunderbird < 10.0.7-1.el6_3 redhat-6.3 ppc64
Affected pkg:rpm/redhat/thunderbird?arch=i686&distro=redhat-6.3 redhat thunderbird < 10.0.7-1.el6_3 redhat-6.3 i686
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...