RHEL 4 / 5 : thunderbird (RHSA-2008:0908)

critical Nessus Plugin ID 34330

Synopsis

The remote Red Hat host is missing a security update.

Description

Updated thunderbird packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-0016, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062)

Several flaws were found in the way malformed HTML mail content was displayed. An HTML mail message containing specially crafted content could potentially trick a Thunderbird user into surrendering sensitive information. (CVE-2008-3835, CVE-2008-4067, CVE-2008-4068)

A flaw was found in Thunderbird that caused certain characters to be stripped from JavaScript code. This flaw could allow malicious JavaScript to bypass or evade script filters. (CVE-2008-4065, CVE-2008-4066)

Note: JavaScript support is disabled by default in Thunderbird; the above issue is not exploitable unless JavaScript is enabled.

A heap based buffer overflow flaw was found in the handling of cancelled newsgroup messages. If the user cancels a specially crafted newsgroup message it could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird.
(CVE-2008-4070)

All Thunderbird users should upgrade to these updated packages, which resolve these issues.

Solution

Update the affected thunderbird package.

See Also

https://access.redhat.com/security/cve/cve-2008-0016

https://access.redhat.com/security/cve/cve-2008-3835

https://access.redhat.com/security/cve/cve-2008-4058

https://access.redhat.com/security/cve/cve-2008-4059

https://access.redhat.com/security/cve/cve-2008-4060

https://access.redhat.com/security/cve/cve-2008-4061

https://access.redhat.com/security/cve/cve-2008-4062

https://access.redhat.com/security/cve/cve-2008-4065

https://access.redhat.com/security/cve/cve-2008-4066

https://access.redhat.com/security/cve/cve-2008-4067

https://access.redhat.com/security/cve/cve-2008-4068

https://access.redhat.com/security/cve/cve-2008-4070

https://access.redhat.com/errata/RHSA-2008:0908

Plugin Details

Severity: Critical

ID: 34330

File Name: redhat-RHSA-2008-0908.nasl

Version: 1.26

Type: local

Agent: unix

Published: 10/2/2008

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:thunderbird, cpe:/o:redhat:enterprise_linux:4.7, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:5.2

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/1/2008

Vulnerability Publication Date: 9/24/2008

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2008-0016, CVE-2008-3835, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062, CVE-2008-4065, CVE-2008-4066, CVE-2008-4067, CVE-2008-4068, CVE-2008-4070

CWE: 119, 189, 22, 264, 399, 79

RHSA: 2008:0908