Mehrere Probleme in Mozilla Thunderbird
ID: | USN-1823-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04 |
Datum: | Mi, 15. Mai 2013, 08:17 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681 |
Applikationen: | Mozilla Thunderbird |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3505253498894636084== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="----enig2UJLLRHNPERINWAJPTLKK" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) ------enig2UJLLRHNPERINWAJPTLKK Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-1823-1 May 14, 2013 thunderbird vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS Summary: Several security issues were fixed in Thunderbird. Software Description: - thunderbird: Mozilla Open Source mail and newsgroup client Details: Multiple memory safety issues were discovered in Thunderbird. If the user were tricked into opening a specially crafted message with scripting enabled, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2013-0801, CVE-2013-1669) Cody Crews discovered that some constructors could be used to bypass restrictions enforced by their Chrome Object Wrapper (COW). If a user had scripting enabled, an attacker could exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2013-1670) A use-after-free was discovered when resizing video content whilst it is playing. If a user had scripting enabled, an attacker could potentially exploit this to execute code with the privileges of the user invoking Thunderbird. (CVE-2013-1674) It was discovered that some DOMSVGZoomEvent functions could be used without being properly initialized, which could lead to information leakage. (CVE-2013-1675) Abhishek Arya discovered multiple memory safety issues in Thunderbird. If the user were tricked into opening a specially crafted message, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: thunderbird 17.0.6+build1-0ubuntu0.13.04.1 Ubuntu 12.10: thunderbird 17.0.6+build1-0ubuntu0.12.10.1 Ubuntu 12.04 LTS: thunderbird 17.0.6+build1-0ubuntu0.12.04.1 After a standard system update you need to restart Thunderbird to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1823-1 CVE-2013-0801, CVE-2013-1669, CVE-2013-1670, CVE-2013-1674, CVE-2013-1675, CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681, https://launchpad.net/bugs/1178649 Package Information: https://launchpad.net/ubuntu/+source/thunderbird/17.0.6+build1-0ubuntu0.13.04.1 https://launchpad.net/ubuntu/+source/thunderbird/17.0.6+build1-0ubuntu0.12.10.1 https://launchpad.net/ubuntu/+source/thunderbird/17.0.6+build1-0ubuntu0.12.04.1 ------enig2UJLLRHNPERINWAJPTLKK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBAgAGBQJRkrODAAoJEGEfvezVlG4PlxQH/irU8dmLWlGhKOCtv/rC0tPa mLxNoUd9G63/FARTrJKuKJKTfBrCWrjyq2r4Q9CHSPlOej0kIktJKvEACIKPCzDC w4bCD9cKxuJuiFKr/rhUIofvdC2T4YElzlrwI1J9EaDcZ/1y9zA8gvc9tC2ZMauY Otnk+l6861/djxisZjtWEYoCKFqibhjbe6DhZ1zMtrOO69tUBjtHj2sxSDQdaCGM LJw9dwIyN8do0Px1qACfguT5+8jK4Txs2m8fb80G2xu4I6XobUwmJNfF7J8UQlrY XrcaoFEfGqmAr4X6Ev4lROcprmrfXV3sPxqWCdMM661C4UbZDTatVRdcAGnhe34= =MLgy -----END PGP SIGNATURE----- ------enig2UJLLRHNPERINWAJPTLKK-- --===============3505253498894636084== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============3505253498894636084==-- |