- --------------------------------------------------------------------------Debian Security Advisory DSA 1159-2                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 8th, 2006                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package        : mozilla-thunderbird
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-2779 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807
                 CVE-2006-3808 CVE-2006-3809 CVE-2006-3810
CERT advisories: VU#466673 VU#655892 VU#687396 VU#876420 VU#911004
BugTraq IDs    : 18228 19181

The latest security updates of Mozilla Thunderbird introduced a
regression that led to a disfunctional attachment panel which warrants
a correction to fix this issue.  For reference please find below the
original advisory text:

  Several security related problems have been discovered in Mozilla and
  derived products such as Mozilla Thunderbird.  The Common
  Vulnerabilities and Exposures project identifies the following
  vulnerabilities:

  CVE-2006-2779

      Mozilla team members discovered several crashes during testing of
      the browser engine showing evidence of memory corruption which may
      also lead to the execution of arbitrary code.  The last bit of
      this problem will be corrected with the next update.  You can
      prevent any trouble by disabling Javascript.  [MFSA-2006-32]

  CVE-2006-3805

      The Javascript engine might allow remote attackers to execute
      arbitrary code.  [MFSA-2006-50]

  CVE-2006-3806

      Multiple integer overflows in the Javascript engine might allow
      remote attackers to execute arbitrary code.  [MFSA-2006-50]

  CVE-2006-3807

      Specially crafted Javascript allows remote attackers to execute
      arbitrary code.  [MFSA-2006-51]

  CVE-2006-3808

      Remote AutoConfig (PAC) servers could execute code with elevated
      privileges via a specially crafted PAC script.  [MFSA-2006-52]

  CVE-2006-3809

      Scripts with the UniversalBrowserRead privilege could gain
      UniversalXPConnect privileges and possibly execute code or obtain
      sensitive data.  [MFSA-2006-53]

  CVE-2006-3810

      A cross-site scripting vulnerability allows remote attackers to
      inject arbitrary web script or HTML.  [MFSA-2006-54]

For the stable distribution (sarge) these problems have been fixed in
version 1.0.2-2.sarge1.0.8b.2.

For the unstable distribution (sid) these problems have been fixed in
version 1.5.0.5-1.

We recommend that you upgrade your mozilla-thunderbird package.


Upgrade Instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------  Source archives:

          Size/MD5 checksum:     1003 359853df29b29253164e9aef34d18066
          Size/MD5 checksum:   486593 3759fe23473ecb6cee532cb47cdd4e63
          Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4

  Alpha architecture:

          Size/MD5 checksum: 12849016 fdf32dcb741195378d9079231aba21cd
          Size/MD5 checksum:  3279426 879ae924d100517f98ee7f39a84e1bb2
          Size/MD5 checksum:   151696 dd6911608eb54bebc7fbcdb58e5d63bb
          Size/MD5 checksum:    33138 9581f8f0be21162692672e55d5f00640
          Size/MD5 checksum:    89106 06a2f4752c619fb6a80d15d8fd1741de

  AMD64 architecture:

          Size/MD5 checksum: 12255346 0ef80084b8dc8f3aeab523b3ce03009e
          Size/MD5 checksum:  3280646 de3c980f39e86509f62348d39ffb65f5
          Size/MD5 checksum:   150662 369341b36fb2a2bcf3178c5bf788c72c
          Size/MD5 checksum:    33132 42ef7496ee17221749feff905c1eb3ce
          Size/MD5 checksum:    88892 15554699cf57f756e7e615910c36e705

  ARM architecture:

          Size/MD5 checksum: 10343074 0716c5639dc5b76dfee6f2aac33378f1
          Size/MD5 checksum:  3271558 0df9cfaf413911576ab6cbda7a366dc5
          Size/MD5 checksum:   142846 59248b09ddba4eea5c15f3a8e441c8b8
          Size/MD5 checksum:    33160 e0292cee475239b5660a1db8a60e9599
          Size/MD5 checksum:    80938 12eae1b21352bdbe21499d74f2ee3bc7

  HP Precision architecture:

          Size/MD5 checksum: 13564760 ac59239f3cd97d1ae63616335e86b755
          Size/MD5 checksum:  3284788 9c9ed05edb7b5d15c444347f27d997b6
          Size/MD5 checksum:   152898 39997b48bfa96256946015464c4cabb9
          Size/MD5 checksum:    33144 9f7a34db227b65158d2907e7030c0a35
          Size/MD5 checksum:    97012 3b4cf017d74aa8a47d723b4c2f196735

  Intel IA-32 architecture:

          Size/MD5 checksum: 11564254 30581baff08ebcf78cb7a805078238c3
          Size/MD5 checksum:  3507668 46a7e9a8d982b9df0a3ac2c0d0f2f9e6
          Size/MD5 checksum:   146348 b8c2a88b083683e63ee7e83846aff346
          Size/MD5 checksum:    33150 5f56019ede768d9132def0798ea1c1fb
          Size/MD5 checksum:    87708 c51a3dc04f9bcba7fdfd486474d63966

  Intel IA-64 architecture:

          Size/MD5 checksum: 14624280 55e21c6d9b9590b7b02646071e3d4881
          Size/MD5 checksum:  3291092 d6cfb0e457c509cfd558b41d6db45e61
          Size/MD5 checksum:   155048 12b7efd38b79c5e152757c1ae2861344
          Size/MD5 checksum:    33144 b941a4303b34f97550744026b347e711
          Size/MD5 checksum:   106840 e5e09e738134c8a7494a2b15e95c40df

  Motorola 680x0 architecture:

          Size/MD5 checksum: 10791360 246f9f51609b2848c2d54f3183e07d5d
          Size/MD5 checksum:  3271086 ad5796c388daa8f0965fdb8a353ba90d
          Size/MD5 checksum:   144660 486d2b72286e105a670c40c4982857fd
          Size/MD5 checksum:    33174 feca51e39ec459f867e412e788308687
          Size/MD5 checksum:    82198 a2252137e94259eb8e699bf4d7a84ab7

  Big endian MIPS architecture:

          Size/MD5 checksum: 11943666 7d1fc9df6d4bb496bbed6b5f10353db3
          Size/MD5 checksum:  3278862 02a47eea657b6d287a860f98bb54c11e
          Size/MD5 checksum:   147602 07157e5a5dd3af8d299f7b4e060b357e
          Size/MD5 checksum:    33146 1d945a5ae87a049a5d12f604f5ecf83f
          Size/MD5 checksum:    84410 53d48b348d8d62b2aa2a2f03cf92e84d

  Little endian MIPS architecture:

          Size/MD5 checksum: 11811276 e8b1890107fb3c3e9410d396dd6fee51
          Size/MD5 checksum:  3279782 c0daeff4c21f2bc5a47731cb06ae51aa
          Size/MD5 checksum:   147156 f240918563f055e8da73d60aff27b63f
          Size/MD5 checksum:    33132 7d1aa8886a3d0b7857298944b03a55ba
          Size/MD5 checksum:    84270 74cbaa157220d3012e421f9427041216

  PowerPC architecture:

          Size/MD5 checksum: 10908472 a7120c11e497b2e280562b3611e0ba55
          Size/MD5 checksum:  3269516 58f62e16cbcc5988ef169c44b746e51a
          Size/MD5 checksum:   144672 a62727479a514dbde5394e455a9bf055
          Size/MD5 checksum:    33136 b839ba3f926ac102c3c322e4e140e40f
          Size/MD5 checksum:    81046 9251eb44207d2610bef616e409951937

  IBM S/390 architecture:

          Size/MD5 checksum: 12702008 ce1773912bae44fdb1473a86b31ffddf
          Size/MD5 checksum:  3280008 d20c17b61ae08aacb9bcf2578ffd2d03
          Size/MD5 checksum:   150980 a7936545066775c99d0cec4cff187ba2
          Size/MD5 checksum:    33140 8389760a91f3444c6170d5ed32867bd1
          Size/MD5 checksum:    88926 d237c5c35347449b6695f352f25b112a

  Sun Sparc architecture:

          Size/MD5 checksum: 11176470 9d792595c891df352238de0e1b4f7639
          Size/MD5 checksum:  3275230 164f9abf5ca1a11a2ca5d0a69cc4a93f
          Size/MD5 checksum:   144318 e79b826ed1d778023f567fee90730446
          Size/MD5 checksum:    33148 7d029003df1ee859d52ceacd8ba1142f
          Size/MD5 checksum:    82746 b308910b4e9c4025b0488d44424b85f3


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: New Mozilla Thunderbird packages fix several problems

September 8, 2006
The latest security updates of Mozilla Thunderbird introduced a regression that led to a disfunctional attachment panel which warrants a correction to fix this issue

Summary

Severity

Related News