CentOS 4 / 5 : thunderbird (CESA-2007:1083)

high Nessus Plugin ID 29750

Synopsis

The remote CentOS host is missing a security update.

Description

Updated thunderbird packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Mozilla Thunderbird is a standalone mail and newsgroup client.

A cross-site scripting flaw was found in the way Thunderbird handled the jar: URI scheme. It may be possible for a malicious HTML mail message to leverage this flaw, and conduct a cross-site scripting attack against a user running Thunderbird. (CVE-2007-5947)

Several flaws were found in the way Thunderbird processed certain malformed HTML mail content. A HTML mail message containing malicious content could cause Thunderbird to crash, or potentially execute arbitrary code as the user running Thunderbird. (CVE-2007-5959)

A race condition existed when Thunderbird set the 'window.location' property when displaying HTML mail content. This flaw could allow a HTML mail message to set an arbitrary Referer header, which may lead to a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header for protection. (CVE-2007-5960)

All users of thunderbird are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.

Solution

Update the affected thunderbird package.

See Also

http://www.nessus.org/u?87950687

http://www.nessus.org/u?41bd4336

http://www.nessus.org/u?6278c021

http://www.nessus.org/u?05fa422a

http://www.nessus.org/u?faf2053e

Plugin Details

Severity: High

ID: 29750

File Name: centos_RHSA-2007-1083.nasl

Version: 1.19

Type: local

Agent: unix

Published: 12/24/2007

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:thunderbird, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/22/2007

Vulnerability Publication Date: 11/13/2007

Reference Information

CVE: CVE-2007-5947, CVE-2007-5959, CVE-2007-5960

BID: 26385, 26589, 26593

CWE: 22, 79

RHSA: 2007:1083