SuSE: 2006-022: MozillaThunderbird various problems Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: MozillaThunderbird
Announcement ID: SUSE-SA:2006:022
Date: Tue, 25 Apr 2006 15:00:00 +0000
Affected Products: SUSE LINUX 10.0
SUSE LINUX 9.3
SUSE LINUX 9.2
SUSE LINUX 9.1
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: no
Cross-References: CVE-2004-1316, CVE-2005-0142, CVE-2005-0149
CVE-2005-0230, CVE-2005-0255, CVE-2005-0399
CVE-2005-0587, CVE-2005-0590, CVE-2005-0592
CVE-2005-0989, CVE-2005-1159, CVE-2005-1160
CVE-2005-1532, CVE-2005-2261, CVE-2005-2265
CVE-2005-2266, CVE-2005-2269, CVE-2005-2270
CVE-2005-2706, CVE-2005-2707, CVE-2006-0292
CVE-2006-0296, CVE-2006-0748, CVE-2006-0749
CVE-2006-0884, CVE-2006-1045, CVE-2006-1727
CVE-2006-1728, CVE-2006-1730, CVE-2006-1731
CVE-2006-1732, CVE-2006-1733, CVE-2006-1734
CVE-2006-1735, CVE-2006-1737, CVE-2006-1739
CVE-2006-1741, CVE-2006-1742, MFSA 2005-02
MFSA 2005-06, MFSA 2005-11, MFSA 2005-15
MFSA 2005-17, MFSA 2005-18, MFSA 2005-21
MFSA 2005-25, MFSA 2005-30, MFSA 2005-33
MFSA 2005-40, MFSA 2005-41, MFSA 2005-44
MFSA 2005-46, MFSA 2005-50, MFSA 2005-52
MFSA 2005-55, MFSA 2005-56, MFSA 2005-58
MFSA 2005-59, MFSA 2006-01, MFSA 2006-05
MFSA 2006-09, MFSA 2006-10, MFSA 2006-11
MFSA 2006-14, MFSA 2006-15, MFSA 2006-16
MFSA 2006-17, MFSA 2006-18, MFSA 2006-19
MFSA 2006-21, MFSA 2006-22, MFSA 2006-24
MFSA 2006-25, MFSA 2006-26, MFSA 2006-27
Content of This Advisory:
1) Security Vulnerability Resolved:
various Mozilla Thunderbird security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Various security bugs have been fixed in Mozilla Thunderbird, bringing
it up to bugfix level of version 1.0.8.
This also catches up on earlier Thunderbird security releases.
Detailed list of issues and affected SUSE Linux versions:
Fixed in Thunderbird 1.0.8 (SUSE Linux 9.1, 9.2, 9.3 and 10.0)
MFSA 2006-27/CVE-2006-0748 - Table Rebuilding Code Execution Vulnerability
MFSA 2006-26/CVE-2006-1045 - Mail Multiple Information Disclosure
MFSA 2006-25/CVE-2006-1727 - Privilege escalation through Print Preview
MFSA 2006-24/CVE-2006-1728 - Privilege escalation using crypto.generateCRMFRequest
MFSA 2006-22/CVE-2006-1730 - CSS Letter-Spacing Heap Overflow Vulnerability
MFSA 2006-21/CVE-2006-0884 - JavaScript execution in mail when forwarding in-line
MFSA 2006-19/CVE-2006-1731 - Cross-site scripting using .valueOf.call()
MFSA 2006-18/CVE-2006-0749 - Mozilla Firefox Tag Order Vulnerability
MFSA 2006-17/CVE-2006-1732 - cross-site scripting through window.controllers MFSA 2006-16/CVE-2006-1733 - Accessing XBL compilation scope via valueOf.call()
MFSA 2006-15/CVE-2006-1734 - Privilege escalation using a JavaScript function's cloned parent
MFSA 2006-14/CVE-2006-1735 - Privilege escalation via XBL.method.eval
MFSA 2006-11/CVE-2006-1737/CVE-2006-1739 - Crashes with evidence of memory corruption (rv:1.8)
MFSA 2006-10/CVE-2006-1742 - JavaScript garbage-collection hazard audit
MFSA 2006-09/CVE-2006-1741 - Cross-site JavaScript injection using event handlers MFSA 2006-05/CVE-2006-0296 - Localstore.rdf XML injection through XULDocument.persist()
MFSA 2006-01/CVE-2006-0292 - JavaScript garbage-collection hazards
Fixed in Thunderbird 1.0.7 (SUSE Linux 9.1, 9.2, 9.3 and 10.0)
MFSA 2005-59/CVE-2005-2707 - Command-line handling on Linux allows shell execution
MFSA 2005-58/CVE-2005-2706 - Firefox 1.0.7 / Mozilla Suite 1.7.12 Vulnerability Fixes
Fixed in Thunderbird 1.0.5/1.0.6 (SUSE Linux 9.1, 9.2 and 9.3)
MFSA 2005-56/CVE-2005-2270 - Code execution through shared function objects
MFSA 2005-55/CVE-2005-2269 - XHTML node spoofing
MFSA 2005-52/CVE-2005-2266 - Same origin violation: frame calling top.focus()
MFSA 2005-50/CVE-2005-2265 - Exploitable crash in InstallVersion.compareTo()
MFSA 2005-46/CVE-2005-2261 - XBL scripts ran even when Javascript disabled
MFSA 2005-44/CVE-2005-1532 - Privilege escalation via non-DOM property overrides
MFSA 2005-41/CVE-2005-1160 - Privilege escalation via DOM property overrides
MFSA 2005-40/CVE-2005-1159 - Missing Install object instance checks
MFSA 2005-33/CVE-2005-0989 - Javascript "lambda" replace exposes memory contents
Fixed in Thunderbird 1.0.2 (SUSE Linux 9.1, 9.2 and 9.3)
MFSA 2005-30/CVE-2005-0399 - GIF heap overflow parsing Netscape extension 2
MFSA 2005-25/CVE-2005-0230 - Image drag and drop executable spoofing
MFSA 2005-21/CVE-2005-0587 - Overwrite arbitrary files downloading .lnk twice
MFSA 2005-18/CVE-2005-0255 - Memory overwrite in string library
MFSA 2005-17/CVE-2005-0590 - Install source spoofing with user:pass@host
MFSA 2005-15/CVE-2005-0592 - Heap overflow possible in UTF8 to Unicode conversion
Fixed in Thunderbird 1.0 (SUSE Linux 9.1 and 9.2)
MFSA 2005-11/CVE-2005-0149 - Mail client responds to cookie requests
Fixed in Thunderbird 0.9 (SUSE Linux 9.1 and 9.2)
MFSA 2005-06/CVE-2004-1316 - Heap overrun handling malicious news: URL
MFSA 2005-02/CVE-2005-0142 - Opened attachments are temporarily saved world-readable
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
See SUSE Security Summary Report.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References