Fedora 7 Update: thunderbird-2.0.0.12-1.fc7
Summary
Mozilla Thunderbird is a standalone mail and newsgroup client.
Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws
were found in the way Thunderbird processed certain malformed HTML mail content.
A HTML mail message containing malicious content could cause Thunderbird to
crash, or potentially execute arbitrary code as the user running Thunderbird.
(CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0419) Several flaws
were found in the way Thunderbird displayed malformed HTML mail content. A HTML
mail message containing specially-crafted content could trick a user into
surrendering sensitive information. (CVE-2008-0591, CVE-2008-0593) A flaw was
found in the way Thunderbird handles certain chrome URLs. If a user has certain
extensions installed, it could allow a malicious HTML mail message to steal
sensitive session data. Note: this flaw does not affect a default installation
of Thunderbird. (CVE-2008-0418) Note: JavaScript support is disabled by
default in Thunderbird; the above issues are not exploitable unless JavaScript
is enabled. A flaw was found in the way Thunderbird saves certain text files.
If a remote site offers a file of type "plain/text", rather than "text/plain",
Thunderbird will not show future "text/plain" content to the user, forcing them
to save those files locally to view the content. (CVE-2008-0592) Users of
thunderbird are advised to upgrade to these updated packages, which contain
backported patches to resolve these issues.
* Tue Feb 26 2008 Christopher Aillon
- Update to 2.0.0.12
* Thu Nov 15 2007 Christopher Aillon
- Update to 2.0.0.9
* Wed Jul 25 2007 Martin Stransky
- added ligature pango fix
* Fri Jul 20 2007 Kai Engert
- 2.0.0.5
* Fri Jun 15 2007 Christopher Aillon
- 2.0.0.4
* Fri Jun 8 2007 Christopher Aillon
- 2.0.0.4 rc1
[ 1 ] Bug #431732 - CVE-2008-0412 Mozilla layout engine crashes
https://bugzilla.redhat.com/show_bug.cgi?id=431732
[ 2 ] Bug #431733 - CVE-2008-0413 Mozilla javascript engine crashes
https://bugzilla.redhat.com/show_bug.cgi?id=431733
[ 3 ] Bug #431739 - CVE-2008-0415 Mozilla arbitrary code execution
https://bugzilla.redhat.com/show_bug.cgi?id=431739
[ 4 ] Bug #431748 - CVE-2008-0418 Mozilla chrome: directory traversal
https://bugzilla.redhat.com/show_bug.cgi?id=431748
[ 5 ] Bug #431749 - CVE-2008-0419 Mozilla arbitrary code execution
https://bugzilla.redhat.com/show_bug.cgi?id=431749
[ 6 ] Bug #431751 - CVE-2008-0591 Mozilla information disclosure flaw
https://bugzilla.redhat.com/show_bug.cgi?id=431751
[ 7 ] Bug #431752 - CVE-2008-0592 Mozilla text file mishandling
https://bugzilla.redhat.com/show_bug.cgi?id=431752
[ 8 ] Bug #431756 - CVE-2008-0593 Mozilla URL token stealing flaw
https://bugzilla.redhat.com/show_bug.cgi?id=431756
[ 9 ] Bug #431750 - CVE-2008-0420 Mozilla information disclosure flaw
https://bugzilla.redhat.com/show_bug.cgi?id=431750
[ 10 ] Bug #435123 - CVE-2008-0304 thunderbird/seamonkey: MIME External-Body Heap Overflow Vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=435123
su -c 'yum update thunderbird' at the command line.
For more information, refer to "Managing Software with yum",
available at .
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce
FEDORA-2008-2118 2008-02-28 21:16:44 Product : Fedora 7 Version : 2.0.0.12 Release : 1.fc7 URL : https://wiki.mozilla.org/Thunderbird:Home_Page Summary : Mozilla Thunderbird mail/newsgroup client Description : Mozilla Thunderbird is a standalone mail and newsgroup client. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the way Thunderbird processed certain malformed HTML mail content. A HTML mail message containing malicious content could cause Thunderbird to crash, or potentially execute arbitrary code as the user running Thunderbird. (CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0419) Several flaws were found in the way Thunderbird displayed malformed HTML mail content. A HTML mail message containing specially-crafted content could trick a user into surrendering sensitive information. (CVE-2008-0591, CVE-2008-0593) A flaw was found in the way Thunderbird handles certain chrome URLs. If a user has certain extensions installed, it could allow a malicious HTML mail message to steal sensitive session data. Note: this flaw does not affect a default installation of Thunderbird. (CVE-2008-0418) Note: JavaScript support is disabled by default in Thunderbird; the above issues are not exploitable unless JavaScript is enabled. A flaw was found in the way Thunderbird saves certain text files. If a remote site offers a file of type "plain/text", rather than "text/plain", Thunderbird will not show future "text/plain" content to the user, forcing them to save those files locally to view the content. (CVE-2008-0592) Users of thunderbird are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. * Tue Feb 26 2008 Christopher Aillon 2.0.0.12-1 - Update to 2.0.0.12 * Thu Nov 15 2007 Christopher Aillon 2.0.0.9-1 - Update to 2.0.0.9 * Wed Jul 25 2007 Martin Stransky 2.0.0.5-2 - added ligature pango fix * Fri Jul 20 2007 Kai Engert - 2.0.0.5-1 - 2.0.0.5 * Fri Jun 15 2007 Christopher Aillon 2.0.0.4-1 - 2.0.0.4 * Fri Jun 8 2007 Christopher Aillon 2.0.0.4-0.rc1 - 2.0.0.4 rc1 [ 1 ] Bug #431732 - CVE-2008-0412 Mozilla layout engine crashes https://bugzilla.redhat.com/show_bug.cgi?id=431732 [ 2 ] Bug #431733 - CVE-2008-0413 Mozilla javascript engine crashes https://bugzilla.redhat.com/show_bug.cgi?id=431733 [ 3 ] Bug #431739 - CVE-2008-0415 Mozilla arbitrary code execution https://bugzilla.redhat.com/show_bug.cgi?id=431739 [ 4 ] Bug #431748 - CVE-2008-0418 Mozilla chrome: directory traversal https://bugzilla.redhat.com/show_bug.cgi?id=431748 [ 5 ] Bug #431749 - CVE-2008-0419 Mozilla arbitrary code execution https://bugzilla.redhat.com/show_bug.cgi?id=431749 [ 6 ] Bug #431751 - CVE-2008-0591 Mozilla information disclosure flaw https://bugzilla.redhat.com/show_bug.cgi?id=431751 [ 7 ] Bug #431752 - CVE-2008-0592 Mozilla text file mishandling https://bugzilla.redhat.com/show_bug.cgi?id=431752 [ 8 ] Bug #431756 - CVE-2008-0593 Mozilla URL token stealing flaw https://bugzilla.redhat.com/show_bug.cgi?id=431756 [ 9 ] Bug #431750 - CVE-2008-0420 Mozilla information disclosure flaw https://bugzilla.redhat.com/show_bug.cgi?id=431750 [ 10 ] Bug #435123 - CVE-2008-0304 thunderbird/seamonkey: MIME External-Body Heap Overflow Vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=435123 su -c 'yum update thunderbird' at the command line. For more information, refer to "Managing Software with yum", available at . All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ Fedora-package-announce mailing list Fedora-package-announce@redhat.com http://www.redhat.com/mailman/listinfo/fedora-package-announce
Change Log
References