Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.884284
Kategorie:CentOS Local Security Checks
Titel:CentOS: Security Advisory for thunderbird (CESA-2023:1806)
Zusammenfassung:The remote host is missing an update for the 'thunderbird'; package(s) announced via the CESA-2023:1806 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the CESA-2023:1806 advisory.

Vulnerability Insight:
Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 102.10.0.

Security Fix(es):

* Thunderbird: Revocation status of S/Mime recipient certificates was not
checked (CVE-2023-0547)

* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to
denial-of-service attack (CVE-2023-28427)

* Mozilla: Fullscreen notification obscured (CVE-2023-29533)

* Mozilla: Potential Memory Corruption following Garbage Collector
compaction (CVE-2023-29535)

* Mozilla: Invalid free from JavaScript code (CVE-2023-29536)

* Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
(CVE-2023-29550)

* Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945)

* Thunderbird: Hang when processing certain OpenPGP messages
(CVE-2023-29479)

* Mozilla: Content-Disposition filename truncation leads to Reflected File
Download (CVE-2023-29539)

* Mozilla: Files with malicious extensions could have been downloaded
unsafely on Linux (CVE-2023-29541)

* Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548)

* Mozilla: Double-free in libwebp (CVE-2023-1999)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'thunderbird' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-0547
https://bugzilla.mozilla.org/show_bug.cgi?id=1811298
https://www.mozilla.org/security/advisories/mfsa2023-15/
Common Vulnerability Exposure (CVE) ID: CVE-2023-1945
https://bugzilla.mozilla.org/show_bug.cgi?id=1777588
https://www.mozilla.org/security/advisories/mfsa2023-14/
Common Vulnerability Exposure (CVE) ID: CVE-2023-1999
https://security.gentoo.org/glsa/202309-05
https://chromium.googlesource.com/webm/libwebp
Common Vulnerability Exposure (CVE) ID: CVE-2023-28427
Debian Security Information: DSA-5392 (Google Search)
https://www.debian.org/security/2023/dsa-5392
https://security.gentoo.org/glsa/202305-36
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-mwq8-fjpf-c2gr
https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0
https://lists.debian.org/debian-lts-announce/2023/04/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-29479
https://cve.ribose.com/advisories/ra-2023-04-11/
https://www.rnpgp.org/blog/2023-04-13-rnp-release-0-16-3/
Common Vulnerability Exposure (CVE) ID: CVE-2023-29533
https://bugzilla.mozilla.org/show_bug.cgi?id=1798219
https://bugzilla.mozilla.org/show_bug.cgi?id=1814597
https://www.mozilla.org/security/advisories/mfsa2023-13/
Common Vulnerability Exposure (CVE) ID: CVE-2023-29535
https://bugzilla.mozilla.org/show_bug.cgi?id=1820543
Common Vulnerability Exposure (CVE) ID: CVE-2023-29536
https://bugzilla.mozilla.org/show_bug.cgi?id=1821959
Common Vulnerability Exposure (CVE) ID: CVE-2023-29539
https://bugzilla.mozilla.org/show_bug.cgi?id=1784348
Common Vulnerability Exposure (CVE) ID: CVE-2023-29541
https://bugzilla.mozilla.org/show_bug.cgi?id=1810191
Common Vulnerability Exposure (CVE) ID: CVE-2023-29548
https://bugzilla.mozilla.org/show_bug.cgi?id=1822754
Common Vulnerability Exposure (CVE) ID: CVE-2023-29550
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1720594%2C1812498%2C1814217%2C1818357%2C1751945%2C1818762%2C1819493%2C1820389%2C1820602%2C1821448%2C1822413%2C1824828
CopyrightCopyright (C) 2023 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.