[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[SECURITY] Fedora 7 Update: thunderbird-2.0.0.12-1.fc7



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-2118
2008-02-28 21:16:44
--------------------------------------------------------------------------------

Name        : thunderbird
Product     : Fedora 7
Version     : 2.0.0.12
Release     : 1.fc7
URL         : http://www.mozilla.org/projects/thunderbird/
Summary     : Mozilla Thunderbird mail/newsgroup client
Description :
Mozilla Thunderbird is a standalone mail and newsgroup client.

--------------------------------------------------------------------------------
Update Information:

Mozilla Thunderbird is a standalone mail and newsgroup client.    Several flaws
were found in the way Thunderbird processed certain malformed HTML mail content.
A HTML mail message containing malicious content could cause Thunderbird to
crash, or potentially execute arbitrary code as the user running Thunderbird.
(CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0419)    Several flaws
were found in the way Thunderbird displayed malformed HTML mail content. A HTML
mail message containing specially-crafted content could trick a user into
surrendering sensitive information. (CVE-2008-0591, CVE-2008-0593)    A flaw was
found in the way Thunderbird handles certain chrome URLs. If a user has certain
extensions installed, it could allow a malicious HTML mail message to steal
sensitive session data. Note: this flaw does not affect a default installation
of Thunderbird. (CVE-2008-0418)    Note: JavaScript support is disabled by
default in Thunderbird; the above issues are not exploitable unless JavaScript
is enabled.    A flaw was found in the way Thunderbird saves certain text files.
If a remote site offers a file of type "plain/text", rather than "text/plain",
Thunderbird will not show future "text/plain" content to the user, forcing them
to save those files locally to view the content. (CVE-2008-0592)     Users of
thunderbird are advised to upgrade to these updated packages, which contain
backported patches to resolve these issues.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Feb 26 2008 Christopher Aillon <caillon redhat com> 2.0.0.12-1
- Update to 2.0.0.12
* Thu Nov 15 2007 Christopher Aillon <caillon redhat com> 2.0.0.9-1
- Update to 2.0.0.9
* Wed Jul 25 2007 Martin Stransky <stransky redhat com> 2.0.0.5-2
- added ligature pango fix
* Fri Jul 20 2007 Kai Engert <kengert redhat com> - 2.0.0.5-1
- 2.0.0.5
* Fri Jun 15 2007 Christopher Aillon <caillon redhat com> 2.0.0.4-1
- 2.0.0.4
* Fri Jun  8 2007 Christopher Aillon <caillon redhat com> 2.0.0.4-0.rc1
- 2.0.0.4 rc1
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #431732 - CVE-2008-0412 Mozilla layout engine crashes
        https://bugzilla.redhat.com/show_bug.cgi?id=431732
  [ 2 ] Bug #431733 - CVE-2008-0413 Mozilla javascript engine crashes
        https://bugzilla.redhat.com/show_bug.cgi?id=431733
  [ 3 ] Bug #431739 - CVE-2008-0415 Mozilla arbitrary code execution
        https://bugzilla.redhat.com/show_bug.cgi?id=431739
  [ 4 ] Bug #431748 - CVE-2008-0418 Mozilla chrome: directory traversal
        https://bugzilla.redhat.com/show_bug.cgi?id=431748
  [ 5 ] Bug #431749 - CVE-2008-0419 Mozilla arbitrary code execution
        https://bugzilla.redhat.com/show_bug.cgi?id=431749
  [ 6 ] Bug #431751 - CVE-2008-0591 Mozilla information disclosure flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=431751
  [ 7 ] Bug #431752 - CVE-2008-0592 Mozilla text file mishandling
        https://bugzilla.redhat.com/show_bug.cgi?id=431752
  [ 8 ] Bug #431756 - CVE-2008-0593 Mozilla URL token stealing flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=431756
  [ 9 ] Bug #431750 - CVE-2008-0420 Mozilla information disclosure flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=431750
  [ 10 ] Bug #435123 - CVE-2008-0304 thunderbird/seamonkey: MIME External-Body Heap Overflow Vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=435123
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update thunderbird' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]