CentOS 4 / 5 : thunderbird (CESA-2009:0258)

critical Nessus Plugin ID 38891

Synopsis

The remote CentOS host is missing a security update.

Description

An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2009-0352, CVE-2009-0353, CVE-2009-0772, CVE-2009-0774, CVE-2009-0775)

Several flaws were found in the way malformed content was processed.
An HTML mail message containing specially crafted content could potentially trick a Thunderbird user into surrendering sensitive information. (CVE-2009-0355, CVE-2009-0776)

Note: JavaScript support is disabled by default in Thunderbird. None of the above issues are exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to this updated package, which resolves these issues. All running instances of Thunderbird must be restarted for the update to take effect.

Solution

Update the affected thunderbird package.

See Also

http://www.nessus.org/u?c1a35d60

http://www.nessus.org/u?c4a64ed6

http://www.nessus.org/u?26212c2a

http://www.nessus.org/u?1b670272

http://www.nessus.org/u?1a8e3ccb

Plugin Details

Severity: Critical

ID: 38891

File Name: centos_RHSA-2009-0258.nasl

Version: 1.20

Type: local

Agent: unix

Published: 5/26/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:thunderbird, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/25/2009

Vulnerability Publication Date: 2/4/2009

Reference Information

CVE: CVE-2009-0352, CVE-2009-0353, CVE-2009-0355, CVE-2009-0772, CVE-2009-0774, CVE-2009-0775, CVE-2009-0776

BID: 33598, 33990

CWE: 200, 264, 399

RHSA: 2009:0258