Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.883305
Kategorie:CentOS Local Security Checks
Titel:CentOS: Security Advisory for thunderbird (CESA-2020:5235)
Zusammenfassung:The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2020:5235 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the CESA-2020:5235 advisory.

Vulnerability Insight:
Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.5.0.

Security Fix(es):

* Mozilla: Parsing mismatches could confuse and bypass security sanitizer
for chrome privileged code (CVE-2020-26951)

* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
(CVE-2020-26968)

* Mozilla: Variable time processing of cross-origin images during drawImage
calls (CVE-2020-16012)

* Mozilla: Fullscreen could be enabled without displaying the security UI
(CVE-2020-26953)

* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956)

* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type
restrictions (CVE-2020-26958)

* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959)

* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960)

* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961)

* Mozilla: Software keyboards may have remembered typed passwords
(CVE-2020-26965)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'thunderbird' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-16012
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
https://crbug.com/1088224
Common Vulnerability Exposure (CVE) ID: CVE-2020-26951
https://www.mozilla.org/security/advisories/mfsa2020-50/
https://www.mozilla.org/security/advisories/mfsa2020-51/
https://www.mozilla.org/security/advisories/mfsa2020-52/
https://bugzilla.mozilla.org/show_bug.cgi?id=1667113
Common Vulnerability Exposure (CVE) ID: CVE-2020-26953
https://bugzilla.mozilla.org/show_bug.cgi?id=1656741
Common Vulnerability Exposure (CVE) ID: CVE-2020-26956
https://bugzilla.mozilla.org/show_bug.cgi?id=1666300
Common Vulnerability Exposure (CVE) ID: CVE-2020-26958
https://bugzilla.mozilla.org/show_bug.cgi?id=1669355
Common Vulnerability Exposure (CVE) ID: CVE-2020-26959
https://bugzilla.mozilla.org/show_bug.cgi?id=1669466
Common Vulnerability Exposure (CVE) ID: CVE-2020-26960
https://bugzilla.mozilla.org/show_bug.cgi?id=1670358
Common Vulnerability Exposure (CVE) ID: CVE-2020-26961
https://bugzilla.mozilla.org/show_bug.cgi?id=1672528
Common Vulnerability Exposure (CVE) ID: CVE-2020-26965
https://bugzilla.mozilla.org/show_bug.cgi?id=1661617
Common Vulnerability Exposure (CVE) ID: CVE-2020-26968
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1551615%2C1607762%2C1656697%2C1657739%2C1660236%2C1667912%2C1671479%2C1671923
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.