drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Mozilla Thunderbird
Name: |
Mehrere Probleme in Mozilla Thunderbird |
|
ID: |
USN-2506-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10 |
|
Datum: |
Di, 3. März 2015, 12:57 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836 |
|
Applikationen: |
Mozilla Thunderbird |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7861875996115499053== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="nHOVXdBcEqjHWHQw0k9PSLQf9JmHQeJWD"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --nHOVXdBcEqjHWHQw0k9PSLQf9JmHQeJWD Content-Type: text/plain; charset=windows-125 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2506-1 March 03, 2015
thunderbird vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description: - thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Armin Razmdjou discovered that contents of locally readable files could be made available via manipulation of form autocomplete in some circumstances. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-0822)
Abhishek Arya discovered an out-of-bounds read and write when rendering SVG content in some circumstances. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-0827)
Paul Bandha discovered a use-after-free in IndexedDB. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-0831)
Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij, Liz Henry, Byron Campen, Tom Schuster, and Ryan VanderMeulen discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message with scripting enabled, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. (CVE-2015-0836)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10: thunderbird 1:31.5.0+build1-0ubuntu0.14.10.1
Ubuntu 14.04 LTS: thunderbird 1:31.5.0+build1-0ubuntu0.14.04.1
Ubuntu 12.04 LTS: thunderbird 1:31.5.0+build1-0ubuntu0.12.04.1
After a standard system update you need to restart Thunderbird to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2506-1 CVE-2015-0822, CVE-2015-0827, CVE-2015-0831, CVE-2015-0836
Package Information: https://launchpad.net/ubuntu/+source/thunderbird/1:31.5.0+build1-0ubuntu0.14.10.1 https://launchpad.net/ubuntu/+source/thunderbird/1:31.5.0+build1-0ubuntu0.14.04.1 https://launchpad.net/ubuntu/+source/thunderbird/1:31.5.0+build1-0ubuntu0.12.04.1
--nHOVXdBcEqjHWHQw0k9PSLQf9JmHQeJWD Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQEcBAEBAgAGBQJU9YfYAAoJEGEfvezVlG4PgD0IAKZya+6UheISDQd/H3Di4zE7 +qwZstTyW4Uvo+YsLzWks3+n2BpLlqQ9veczwS3rwfhOnD1Ku7bQ+TkRZeNk8o2q XPOJCIFa48BEcs2xaNMPuCGNgYoFeuVSSPU7b8RvTnoohp+m/WRwLvKwuZTuxD6J ffT5a/rIbSGz+9FXZM/lz8ncZBggViicu36UE/M/1UfMTSehIr8rTgvDUmhz/csH u8iVq1E9EX1Z4NQpLj8O1NwWHSqK1ke6H5rb7SB7RMPEJZcZKn+CKh4iMY6m/kMQ WDI139IHJ6Ju98ZuFZexmKUslDX4oQOVtgDadeT10lP+ExUc7ePd88xvJdq6R4g= =0WBU -----END PGP SIGNATURE-----
--nHOVXdBcEqjHWHQw0k9PSLQf9JmHQeJWD--
--===============7861875996115499053== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============7861875996115499053==--
|
|
|
|