![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.882928 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS Update for thunderbird CESA-2018:2251 centos6 |
Zusammenfassung: | Check the version of thunderbird |
Beschreibung: | Summary: Check the version of thunderbird Vulnerability Insight: Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.9.1. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) * Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) * Mozilla: Use-after-free using focus() (CVE-2018-12360) * Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) * Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) * Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) * thunderbird: S/MIME and PGP decryption oracles can be built with HTML emails (CVE-2018-12372) * thunderbird: S/MIME plaintext can be leaked through HTML reply/forward (CVE-2018-12373) * Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) * Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366) * thunderbird: Using form to exfiltrate encrypted mail part by pressing enter in form field (CVE-2018-12374) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the original reporters. Affected Software/OS: thunderbird on CentOS 6 Solution: Please install the updated packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-5188 BugTraq ID: 104555 http://www.securityfocus.com/bid/104555 Debian Security Information: DSA-4244 (Google Search) https://www.debian.org/security/2018/dsa-4244 https://security.gentoo.org/glsa/201810-01 https://security.gentoo.org/glsa/201811-13 https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html RedHat Security Advisories: RHSA-2018:2112 https://access.redhat.com/errata/RHSA-2018:2112 RedHat Security Advisories: RHSA-2018:2113 https://access.redhat.com/errata/RHSA-2018:2113 RedHat Security Advisories: RHSA-2018:2251 https://access.redhat.com/errata/RHSA-2018:2251 RedHat Security Advisories: RHSA-2018:2252 https://access.redhat.com/errata/RHSA-2018:2252 https://usn.ubuntu.com/3705-1/ https://usn.ubuntu.com/3714-1/ https://usn.ubuntu.com/3749-1/ Common Vulnerability Exposure (CVE) ID: CVE-2018-12359 Debian Security Information: DSA-4235 (Google Search) https://www.debian.org/security/2018/dsa-4235 http://www.securitytracker.com/id/1041193 Common Vulnerability Exposure (CVE) ID: CVE-2018-12360 Common Vulnerability Exposure (CVE) ID: CVE-2018-12362 BugTraq ID: 104560 http://www.securityfocus.com/bid/104560 Common Vulnerability Exposure (CVE) ID: CVE-2018-12363 Common Vulnerability Exposure (CVE) ID: CVE-2018-12364 Common Vulnerability Exposure (CVE) ID: CVE-2018-12365 Common Vulnerability Exposure (CVE) ID: CVE-2018-12366 Common Vulnerability Exposure (CVE) ID: CVE-2018-12372 BugTraq ID: 104613 http://www.securityfocus.com/bid/104613 Common Vulnerability Exposure (CVE) ID: CVE-2018-12373 Common Vulnerability Exposure (CVE) ID: CVE-2018-12374 |
Copyright | Copyright (C) 2018 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |