Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0405-1 advisory.
Update to Mozilla Thunderbird 128.7 (MFSA 2025-10, bsc#1236539).
Security fixes:
- CVE-2025-1009: use-after-free in XSLT.
- CVE-2025-1010: use-after-free in Custom Highlight.
- CVE-2025-1011: a bug in WebAssembly code generation could result in a crash.
- CVE-2025-1012: use-after-free during concurrent delazification.
- CVE-2024-11704: potential double-free vulnerability in PKCS#7 decryption handling.
- CVE-2025-1013: potential opening of private browsing tabs in normal browsing windows.
- CVE-2025-1014: certificate length was not properly checked.
- CVE-2025-1015: unsanitized address book fields.
- CVE-2025-0510: address of e-mail sender can be spoofed by malicious email.
- CVE-2025-1016: memory safety bugs.
- CVE-2025-1017: memory safety bugs.
Other fixes:
- fixed: images inside links could zoom when clicked instead of opening the link.
- fixed: compacting an empty folder failed with write error.
- fixed: compacting of IMAP folder with corrupted local storage failed with write error.
- fixed: after restart, all restored tabs with opened PDFs showed the same attachment.
- fixed: exceptions during CalDAV item processing would halt subsequent item handling.
- fixed: context menu was unable to move email address to a different field.
- fixed: link at about:rights pointed to Firefox privacy policy instead of Thunderbird's.
- fixed: POP3 'fetch headers only' and 'get selected messages' could delete messages.
- fixed: 'Search Online' checkbox in saved search properties was incorrectly disabled.
- fixed: POP3 status message showed incorrect download count when messages were deleted.
- fixed: space bar did not always advance to the next unread message.
- fixed: folder creation or renaming failed due to incorrect preference settings.
- fixed: forwarding/editing S/MIME drafts/templates unusable due to regression (bsc#1236411).
- fixed: sort order in 'Search Messages' panel reset after search or on first launch.
- fixed: reply window added an unnecessary third blank line at the top.
- fixed: Thunderbird spell check box did not allow ENTER to accept suggested changes.
- fixed: long email subject lines could overlap window control buttons on macOS.
- fixed: flathub manifest link was not correct.
- fixed: 'Prefer client-side email scheduling' needed to be selected twice.
- fixed: duplicate invitations were sent if CALDAV calendar email case did not match.
- fixed: visual and UX improvements.
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected MozillaThunderbird, MozillaThunderbird-translations-common and / or MozillaThunderbird-translations- other packages.
Plugin Details
File Name: suse_SU-2025-0405-1.nasl
Agent: unix
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:mozillathunderbird, p-cpe:/a:novell:suse_linux:mozillathunderbird-translations-common, p-cpe:/a:novell:suse_linux:mozillathunderbird-translations-other
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 2/10/2025
Vulnerability Publication Date: 11/25/2024
Reference Information
CVE: CVE-2024-11704, CVE-2025-0510, CVE-2025-1009, CVE-2025-1010, CVE-2025-1011, CVE-2025-1012, CVE-2025-1013, CVE-2025-1014, CVE-2025-1015, CVE-2025-1016, CVE-2025-1017
SuSE: SUSE-SU-2025:0405-1