Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mandriva Update for mozilla-thunderbird MDVSA-2012:147 (mozilla-thunderbird)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update for the 'mozilla-thunderbird' package(s) announced via the referenced advisory.
Insight
Insight
Security issues were identified and fixed in mozilla thunderbird: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-1971). In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products (CVE-2012-1970). Security researcher Abhishek Arya (Inferno) of Google Chrome Security Team discovered a series of use-after-free issues using the Address Sanitizer tool. Many of these issues are potentially exploitable, allowing for remote code execution (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964). Security researcher Mariusz Mlynski reported that it is possible to shadow the location object using Object.defineProperty. This could be used to confuse the current location to plugins, allowing for possible cross-site scripting (XSS) attacks (CVE-2012-1956). Security researcher Frederic Hoguin reported two related issues with the decoding of bitmap (.BMP) format images embedded in icon (.ICO) format files. When processing a negative height header value for the bitmap image, a memory corruption can be induced, allowing an attacker to write random memory and cause a crash. This crash may be potentially exploitable (CVE-2012-3966). Description truncated, please see the referenced URL(s) for more information.
Affected Software
Affected Software
mozilla-thunderbird on Mandriva Linux 2011.0
Solution
Solution
Please Install the Updated Packages.
Common Vulnerabilities and Exposures (CVE)
- CVE-2012-1971
- CVE-2012-1970
- CVE-2012-1972
- CVE-2012-1973
- CVE-2012-1974
- CVE-2012-1975
- CVE-2012-1976
- CVE-2012-3956
- CVE-2012-3957
- CVE-2012-3958
- CVE-2012-3959
- CVE-2012-3960
- CVE-2012-3961
- CVE-2012-3962
- CVE-2012-3963
- CVE-2012-3964
- CVE-2012-1956
- CVE-2012-3966
- CVE-2012-3968
- CVE-2012-3967
- CVE-2012-3969
- CVE-2012-3970
- CVE-2012-3971
- CVE-2012-3972
- CVE-2012-3974
- CVE-2012-3975
- CVE-2012-3978
- CVE-2012-3980