This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3505253498894636084== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="----enig2UJLLRHNPERINWAJPTLKK"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) ------enig2UJLLRHNPERINWAJPTLKK Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1823-1 May 14, 2013
thunderbird vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description: - thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Multiple memory safety issues were discovered in Thunderbird. If the user were tricked into opening a specially crafted message with scripting enabled, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2013-0801, CVE-2013-1669)
Cody Crews discovered that some constructors could be used to bypass restrictions enforced by their Chrome Object Wrapper (COW). If a user had scripting enabled, an attacker could exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2013-1670)
A use-after-free was discovered when resizing video content whilst it is playing. If a user had scripting enabled, an attacker could potentially exploit this to execute code with the privileges of the user invoking Thunderbird. (CVE-2013-1674)
It was discovered that some DOMSVGZoomEvent functions could be used without being properly initialized, which could lead to information leakage. (CVE-2013-1675)
Abhishek Arya discovered multiple memory safety issues in Thunderbird. If the user were tricked into opening a specially crafted message, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.04: thunderbird 17.0.6+build1-0ubuntu0.13.04.1
Ubuntu 12.10: thunderbird 17.0.6+build1-0ubuntu0.12.10.1
Ubuntu 12.04 LTS: thunderbird 17.0.6+build1-0ubuntu0.12.04.1
After a standard system update you need to restart Thunderbird to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1823-1 CVE-2013-0801, CVE-2013-1669, CVE-2013-1670, CVE-2013-1674, CVE-2013-1675, CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681, https://launchpad.net/bugs/1178649
Package Information: https://launchpad.net/ubuntu/+source/thunderbird/17.0.6+build1-0ubuntu0.13.04.1 https://launchpad.net/ubuntu/+source/thunderbird/17.0.6+build1-0ubuntu0.12.10.1 https://launchpad.net/ubuntu/+source/thunderbird/17.0.6+build1-0ubuntu0.12.04.1
------enig2UJLLRHNPERINWAJPTLKK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQEcBAEBAgAGBQJRkrODAAoJEGEfvezVlG4PlxQH/irU8dmLWlGhKOCtv/rC0tPa mLxNoUd9G63/FARTrJKuKJKTfBrCWrjyq2r4Q9CHSPlOej0kIktJKvEACIKPCzDC w4bCD9cKxuJuiFKr/rhUIofvdC2T4YElzlrwI1J9EaDcZ/1y9zA8gvc9tC2ZMauY Otnk+l6861/djxisZjtWEYoCKFqibhjbe6DhZ1zMtrOO69tUBjtHj2sxSDQdaCGM LJw9dwIyN8do0Px1qACfguT5+8jK4Txs2m8fb80G2xu4I6XobUwmJNfF7J8UQlrY XrcaoFEfGqmAr4X6Ev4lROcprmrfXV3sPxqWCdMM661C4UbZDTatVRdcAGnhe34= =MLgy -----END PGP SIGNATURE-----
------enig2UJLLRHNPERINWAJPTLKK--
--===============3505253498894636084== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3505253498894636084==--
|