Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.884225
Kategorie:CentOS Local Security Checks
Titel:CentOS: Security Advisory for thunderbird (CESA-2022:5480)
Zusammenfassung:The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2022:5480 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the CESA-2022:5480 advisory.

Vulnerability Insight:
Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 91.11.

Security Fix(es):

* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via
retargeted javascript: URI (CVE-2022-34468)

* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470)

* Mozilla: A popup window could be resized in a way to overlay the address
bar with web content (CVE-2022-34479)

* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
(CVE-2022-34484)

* Mozilla: Undesired attributes could be set as part of prototype pollution
(CVE-2022-2200)

* Mozilla: An email with a mismatching OpenPGP signature date was accepted
as valid (CVE-2022-2226)

* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744)

* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked
(CVE-2022-34472)

* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'thunderbird' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-2200
https://bugzilla.mozilla.org/show_bug.cgi?id=1771381
https://www.mozilla.org/security/advisories/mfsa2022-24/
https://www.mozilla.org/security/advisories/mfsa2022-25/
https://www.mozilla.org/security/advisories/mfsa2022-26/
Common Vulnerability Exposure (CVE) ID: CVE-2022-2226
https://bugzilla.mozilla.org/show_bug.cgi?id=1775441
Common Vulnerability Exposure (CVE) ID: CVE-2022-31744
https://bugzilla.mozilla.org/show_bug.cgi?id=1757604
https://www.mozilla.org/security/advisories/mfsa2022-20/
Common Vulnerability Exposure (CVE) ID: CVE-2022-34468
https://bugzilla.mozilla.org/show_bug.cgi?id=1768537
Common Vulnerability Exposure (CVE) ID: CVE-2022-34470
https://bugzilla.mozilla.org/show_bug.cgi?id=1765951
Common Vulnerability Exposure (CVE) ID: CVE-2022-34472
https://bugzilla.mozilla.org/show_bug.cgi?id=1770123
Common Vulnerability Exposure (CVE) ID: CVE-2022-34479
https://bugzilla.mozilla.org/show_bug.cgi?id=1745595
Common Vulnerability Exposure (CVE) ID: CVE-2022-34481
https://bugzilla.mozilla.org/show_bug.cgi?id=1497246
Common Vulnerability Exposure (CVE) ID: CVE-2022-34484
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.