Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55711
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-868-1)
Summary:The remote host is missing an update for the Debian 'mozilla-thunderbird' package(s) announced via the DSA-868-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'mozilla-thunderbird' package(s) announced via the DSA-868-1 advisory.

Vulnerability Insight:
Several security-related problems have been discovered in Mozilla and derived programs. Some of the following problems don't exactly apply to Mozilla Thunderbird, even though the code is present. In order to keep the codebase in sync with upstream it has been altered nevertheless. The Common Vulnerabilities and Exposures project identifies the following problems:

CAN-2005-2871

Tom Ferris discovered a bug in the IDN hostname handling of Mozilla that allows remote attackers to cause a denial of service and possibly execute arbitrary code via a hostname with dashes.

CAN-2005-2701

A buffer overflow allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.

CAN-2005-2702

Mats Palmgren discovered a buffer overflow in the Unicode string parser that allows a specially crafted Unicode sequence to overflow a buffer and cause arbitrary code to be executed.

CAN-2005-2703

Remote attackers could spoof HTTP headers of XML HTTP requests via XMLHttpRequest and possibly use the client to exploit vulnerabilities in servers or proxies.

CAN-2005-2704

Remote attackers could spoof DOM objects via an XBL control that implements an internal XPCOM interface.

CAN-2005-2705

Georgi Guninski discovered an integer overflow in the JavaScript engine that might allow remote attackers to execute arbitrary code.

CAN-2005-2706

Remote attackers could execute Javascript code with chrome privileges via an about: page such as about:mozilla.

CAN-2005-2707

Remote attackers could spawn windows without user interface components such as the address and status bar that could be used to conduct spoofing or phishing attacks.

CAN-2005-2968

Peter Zelezny discovered that shell metacharacters are not properly escaped when they are passed to a shell script and allow the execution of arbitrary commands, e.g. when a malicious URL is automatically copied from another program into Mozilla as default browser.

For the stable distribution (sarge) these problems have been fixed in version 1.0.2-2.sarge1.0.7.

For the unstable distribution (sid) these problems have been fixed in version 1.0.7-1.

We recommend that you upgrade your mozilla-thunderbird package.

Affected Software/OS:
'mozilla-thunderbird' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-2701
1014954
http://securitytracker.com/id?1014954
14916
http://www.securityfocus.com/bid/14916
15495
http://www.securityfocus.com/bid/15495
16911
http://secunia.com/advisories/16911
16917
http://secunia.com/advisories/16917
16977
http://secunia.com/advisories/16977
17014
http://secunia.com/advisories/17014
17026
http://secunia.com/advisories/17026
17149
http://secunia.com/advisories/17149
17263
http://secunia.com/advisories/17263
17284
http://secunia.com/advisories/17284
19643
http://www.osvdb.org/19643
ADV-2005-1824
http://www.vupen.com/english/advisories/2005/1824
DSA-838
http://www.debian.org/security/2005/dsa-838
DSA-866
http://www.debian.org/security/2005/dsa-866
DSA-868
http://www.debian.org/security/2005/dsa-868
FLSA-2006:168375
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html
MDKSA-2005:169
http://www.mandriva.com/security/advisories?name=MDKSA-2005:169
MDKSA-2005:170
http://www.mandriva.com/security/advisories?name=MDKSA-2005:170
MDKSA-2005:174
http://www.mandriva.com/security/advisories?name=MDKSA-2005:174
RHSA-2005:785
http://www.redhat.com/support/errata/RHSA-2005-785.html
RHSA-2005:789
http://www.redhat.com/support/errata/RHSA-2005-789.html
SCOSA-2005.49
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
SUSE-SA:2005:058
http://www.novell.com/linux/security/advisories/2005_58_mozilla.html
USN-200-1
http://www.ubuntu.com/usn/usn-200-1
http://www.mozilla.org/security/announce/mfsa2005-58.html
mozilla-xbm-bo(22373)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22373
oval:org.mitre.oval:def:1480
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1480
oval:org.mitre.oval:def:9323
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323
Common Vulnerability Exposure (CVE) ID: CVE-2005-2702
14918
http://www.securityfocus.com/bid/14918
17042
http://secunia.com/advisories/17042
17090
http://secunia.com/advisories/17090
RHSA-2005:791
http://www.redhat.com/support/errata/RHSA-2005-791.html
mozilla-zerowidthnonjoiner-stack-corruption(22375)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22375
oval:org.mitre.oval:def:1150
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1150
oval:org.mitre.oval:def:11609
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11609
Common Vulnerability Exposure (CVE) ID: CVE-2005-2703
14923
http://www.securityfocus.com/bid/14923
mozilla-xmlhttprequest-spoofing(22376)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22376
oval:org.mitre.oval:def:10767
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10767
oval:org.mitre.oval:def:1089
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1089
Common Vulnerability Exposure (CVE) ID: CVE-2005-2704
14921
http://www.securityfocus.com/bid/14921
mozilla-thunderbird-xml-object-spoof(22824)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22824
oval:org.mitre.oval:def:1272
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1272
oval:org.mitre.oval:def:9784
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9784
Common Vulnerability Exposure (CVE) ID: CVE-2005-2705
14917
http://www.securityfocus.com/bid/14917
https://bugzilla.mozilla.org/show_bug.cgi?id=303213
mozilla-javascript-bo(22377)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22377
oval:org.mitre.oval:def:10367
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10367
oval:org.mitre.oval:def:1307
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1307
Common Vulnerability Exposure (CVE) ID: CVE-2005-2706
14920
http://www.securityfocus.com/bid/14920
19648
http://www.osvdb.org/19648
19823
http://secunia.com/advisories/19823
SUSE-SA:2006:022
http://www.novell.com/linux/security/advisories/2006_04_25.html
mozilla-about-execute-code(22378)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22378
oval:org.mitre.oval:def:11317
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11317
oval:org.mitre.oval:def:1443
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1443
Common Vulnerability Exposure (CVE) ID: CVE-2005-2707
14919
http://www.securityfocus.com/bid/14919
http://www.mozilla.org/security/announce/mfsa2005-59.html
mozilla-chrome-window-spoofing(22380)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22380
oval:org.mitre.oval:def:11130
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11130
oval:org.mitre.oval:def:1197
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1197
Common Vulnerability Exposure (CVE) ID: CVE-2005-2871
1014877
http://securitytracker.com/id?1014877
14784
http://www.securityfocus.com/bid/14784
16764
http://secunia.com/advisories/16764
16766
http://secunia.com/advisories/16766
16767
http://secunia.com/advisories/16767
19255
http://www.osvdb.org/19255
20050909 Mozilla Firefox "Host:" Buffer Overflow
http://marc.info/?l=full-disclosure&m=112624614008387&w=2
20050911 FireFox "Host:" Buffer Overflow is not just exploitable on FireFox
http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0316.html
83
http://securityreason.com/securityalert/83
ADV-2005-1690
http://www.vupen.com/english/advisories/2005/1690
ADV-2005-1691
http://www.vupen.com/english/advisories/2005/1691
DSA-837
http://www.debian.org/security/2005/dsa-837
GLSA-200509-11
http://www.gentoo.org/security/en/glsa/glsa-200509-11.xml
P-303
http://www.ciac.org/ciac/bulletins/p-303.shtml
RHSA-2005:768
http://www.redhat.com/support/errata/RHSA-2005-768.html
RHSA-2005:769
http://www.redhat.com/support/errata/RHSA-2005-769.html
USN-181-1
http://www.ubuntu.com/usn/usn-181-1
VU#573857
http://www.kb.cert.org/vuls/id/573857
http://www.mozilla.org/security/announce/mfsa2005-57.html
http://www.securiteam.com/securitynews/5RP0B0UGVW.html
http://www.security-protocols.com/advisory/sp-x17-advisory.txt
http://www.security-protocols.com/firefox-death.html
https://bugzilla.mozilla.org/show_bug.cgi?id=307259
mozilla-url-bo(22207)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22207
oval:org.mitre.oval:def:1287
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1287
oval:org.mitre.oval:def:584
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A584
oval:org.mitre.oval:def:9608
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9608
Common Vulnerability Exposure (CVE) ID: CVE-2005-2968
14888
http://www.securityfocus.com/bid/14888
16869
http://secunia.com/advisories/16869
ADV-2005-1794
http://www.vupen.com/english/advisories/2005/1794
USN-186-1
http://www.ubuntu.com/usn/usn-186-1
USN-186-2
http://www.ubuntu.com/usn/usn-186-2
VU#914681
http://www.kb.cert.org/vuls/id/914681
https://bugzilla.mozilla.org/show_bug.cgi?id=307185
oval:org.mitre.oval:def:11105
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11105
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.