openSUSE Security Update : MozillaThunderbird (openSUSE-SU-2013:1495-1)

critical Nessus Plugin ID 75150

Synopsis

The remote openSUSE host is missing a security update.

Description

This MozillaThunderbird update to version 24.0 fixes several security and non-security issues :

- update to Thunderbird 24.0 (bnc#840485)

- MFSA 2013-76/CVE-2013-1718/CVE-2013-1719 Miscellaneous memory safety hazards

- MFSA 2013-77/CVE-2013-1720 (bmo#888820) Improper state in HTML5 Tree Builder with templates

- MFSA 2013-79/CVE-2013-1722 (bmo#893308) Use-after-free in Animation Manager during stylesheet cloning

- MFSA 2013-80/CVE-2013-1723 (bmo#891292) NativeKey continues handling key messages after widget is destroyed

- MFSA 2013-81/CVE-2013-1724 (bmo#894137) Use-after-free with select element

- MFSA 2013-82/CVE-2013-1725 (bmo#876762) Calling scope for new JavaScript objects can lead to memory corruption

- MFSA 2013-85/CVE-2013-1728 (bmo#883686) Uninitialized data in IonMonkey

- MFSA 2013-88/CVE-2013-1730 (bmo#851353) Compartment mismatch re-attaching XBL-backed nodes

- MFSA 2013-89/CVE-2013-1732 (bmo#883514) Buffer overflow with multi-column, lists, and floats

- MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301) Memory corruption involving scrolling

- MFSA 2013-91/CVE-2013-1737 (bmo#907727) User-defined properties on DOM proxies get the wrong 'this' object

- MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897) GC hazard with default compartments and frame chain restoration

- moved greek to common translation package

- require NSPR 4.10 and NSS 3.15.1

- add GStreamer build requirements for Gecko

- added enigmail-build.patch to fix TB packaging (bmo#886095)

- removed obsolete patches :

- enigmail-old-gcc.patch

- mozilla-gcc43-enums.patch

- mozilla-gcc43-template_hacks.patch

- mozilla-gcc43-templates_instantiation.patch

- ppc-xpcshell.patch

Solution

Update the affected MozillaThunderbird packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=840485

https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html

Plugin Details

Severity: Critical

ID: 75150

File Name: openSUSE-2013-719.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:mozillathunderbird-translations-other, cpe:/o:novell:opensuse:12.3, p-cpe:/a:novell:opensuse:mozillathunderbird, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:mozillathunderbird-buildsymbols, p-cpe:/a:novell:opensuse:mozillathunderbird-translations-common, p-cpe:/a:novell:opensuse:enigmail, p-cpe:/a:novell:opensuse:mozillathunderbird-debugsource, p-cpe:/a:novell:opensuse:mozillathunderbird-devel, p-cpe:/a:novell:opensuse:enigmail-debuginfo, p-cpe:/a:novell:opensuse:mozillathunderbird-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/19/2013

Reference Information

CVE: CVE-2013-1718, CVE-2013-1719, CVE-2013-1720, CVE-2013-1722, CVE-2013-1723, CVE-2013-1724, CVE-2013-1725, CVE-2013-1728, CVE-2013-1730, CVE-2013-1732, CVE-2013-1735, CVE-2013-1736, CVE-2013-1737, CVE-2013-1738