LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2010:051: mozilla-thunderbird Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A vulnerabilitiy has been found and corrected in mozilla-thunderbird: Security researcher Alin Rad Pop of Secunia Research reported that the HTML parser incorrectly freed used memory when insufficient space was available to process remaining input. Under such circumstances, [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:051
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : mozilla-thunderbird
 Date    : March 1, 2010
 Affected: 2008.0, 2009.1, 2010.0
 _______________________________________________________________________

 Problem Description:

 A vulnerabilitiy has been found and corrected in mozilla-thunderbird:
 
 Security researcher Alin Rad Pop of Secunia Research reported that
 the HTML parser incorrectly freed used memory when insufficient space
 was available to process remaining input. Under such circumstances,
 memory occupied by in-use objects was freed and could later be filled
 with attacker-controlled text. These conditions could result in the
 execution or arbitrary code if methods on the freed objects were
 subsequently called (CVE-2009-1571).
 
 Packages for 2008.0 are provided for Corporate Desktop 2008.0
 customers.
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571
 http://www.mozilla.org/security/announce/2010/mfsa2010-03.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.0:
 2669429882c6f2d4f896007a4b81c0cc  2008.0/i586/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.i586.rpm
 8ab5c1d63809c1cbc46f52de0afc053f  2008.0/i586/mozilla-thunderbird-devel-2.0.0.23-1.3mdv2008.0.i586.rpm
 c40f64b4e053d51df02c23d777615f9c  2008.0/i586/mozilla-thunderbird-enigmail-2.0.0.23-1.3mdv2008.0.i586.rpm
 f43d572170fec137873c42c698abba4d  2008.0/i586/nsinstall-2.0.0.23-1.3mdv2008.0.i586.rpm 
 4abdb45fe3d2091d6aeb84094d8ac1a2  2008.0/SRPMS/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 6172c6e7d8852d8ec73b29ae814417fe  2008.0/x86_64/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.x86_64.rpm
 e691518e1dd9120b3ec55cc80af4e928  2008.0/x86_64/mozilla-thunderbird-devel-2.0.0.23-1.3mdv2008.0.x86_64.rpm
 a30f96d07eea85b6678d3469a5b88f91  2008.0/x86_64/mozilla-thunderbird-enigmail-2.0.0.23-1.3mdv2008.0.x86_64.rpm
 81b4ddb1e4eecc848c4cbc37bd3f4b87  2008.0/x86_64/nsinstall-2.0.0.23-1.3mdv2008.0.x86_64.rpm 
 4abdb45fe3d2091d6aeb84094d8ac1a2  2008.0/SRPMS/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.src.rpm

 Mandriva Linux 2009.1:
 d68983379c1ca52f6c0a4175e79cd640  2009.1/i586/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.i586.rpm
 9e89756f135bdaa72bf6b511ee667ead  2009.1/i586/mozilla-thunderbird-devel-2.0.0.23-0.4mdv2009.1.i586.rpm
 bbf5f3bda970bb86ce55b66e12e64907  2009.1/i586/mozilla-thunderbird-enigmail-2.0.0.23-0.4mdv2009.1.i586.rpm
 c1a46fbffdd4d2fc5c101fcc55b902b6  2009.1/i586/nsinstall-2.0.0.23-0.4mdv2009.1.i586.rpm 
 72d65ce1a53e8844e8c71f621fdadc18  2009.1/SRPMS/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 802e7555022b4baf6f28269f04682bce  2009.1/x86_64/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.x86_64.rpm
 122a5efa00ccc3dafbe270f14a1962cf  2009.1/x86_64/mozilla-thunderbird-devel-2.0.0.23-0.4mdv2009.1.x86_64.rpm
 49fb3867b121998c86c120ae42d4b9fc  2009.1/x86_64/mozilla-thunderbird-enigmail-2.0.0.23-0.4mdv2009.1.x86_64.rpm
 6f9df106772918d05836526a11f40e16  2009.1/x86_64/nsinstall-2.0.0.23-0.4mdv2009.1.x86_64.rpm 
 72d65ce1a53e8844e8c71f621fdadc18  2009.1/SRPMS/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.src.rpm

 Mandriva Linux 2010.0:
 9ef8f1537843b2c490ca143f3483ff90  2010.0/i586/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.i586.rpm
 c79d2b30bacc364d332369b5af9bdd63  2010.0/i586/mozilla-thunderbird-devel-2.0.0.23-3.3mdv2010.0.i586.rpm
 ba2eb612b17795a6c0bbbde7494a14d3  2010.0/i586/mozilla-thunderbird-enigmail-2.0.0.23-3.3mdv2010.0.i586.rpm
 6df1a02ac8002218f5b1e47a2fff9925  2010.0/i586/nsinstall-2.0.0.23-3.3mdv2010.0.i586.rpm 
 62a8bf250e22e2bd78f0cb2baa0199d1  2010.0/SRPMS/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 9237ccb3f2930777857bf4e2e9316b19  2010.0/x86_64/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.x86_64.rpm
 e5fba2b9e3b714887cfef59028c58da0  2010.0/x86_64/mozilla-thunderbird-devel-2.0.0.23-3.3mdv2010.0.x86_64.rpm
 f1e53699bf38123350a4cde8ad89a506  2010.0/x86_64/mozilla-thunderbird-enigmail-2.0.0.23-3.3mdv2010.0.x86_64.rpm
 099f31525f8a73242481bc121a05f811  2010.0/x86_64/nsinstall-2.0.0.23-3.3mdv2010.0.x86_64.rpm 
 62a8bf250e22e2bd78f0cb2baa0199d1  2010.0/SRPMS/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Home router security holes to be exposed at Def Con 22 hacker meet up
Edward Snowden Calls on Hackers to Help Whistleblowers Leak More Secrets
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.