Linux Security
Linux Security
Linux Security

Debian: Mozilla Thunderbird fix several vulnerabilities DSA-1191-1

Date 05 Oct 2006
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1191-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
October 5th, 2006             
- --------------------------------------------------------------------------

Package        : mozilla-thunderbird
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566
                 CVE-2006-4568 CVE-2006-4570 CVE-2006-4571
BugTraq ID     : 20042

Several security related problems have been discovered in Mozilla and
derived products such as Mozilla Thunderbird.  The Common
Vulnerabilities and Exposures project identifies the following


    Fernando Ribeiro discovered that a vulnerability in the getRawDER
    functionallows remote attackers to cause a denial of service
    (hang) and possibly execute arbitrary code.


    Daniel Bleichenbacher recently described an implementation error
    in RSA signature verification that cause the application to
    incorrectly trust SSL certificates.

CVE-2006-4565, CVE-2006-4566

    Priit Laes reported that that a JavaScript regular expression can
    trigger a heap-based buffer overflow which allows remote attackers
    to cause a denial of service and possibly execute arbitrary code.


    A vulnerability has been discovered that allows remote attackers
    to bypass the security model and inject content into the sub-frame
    of another site.


    Georgi Guninski demonstrated that even with JavaScript disabled in
    mail (the default) an attacker can still execute JavaScript when a
    mail message is viewed, replied to, or forwarded.


    Multiple unspecified vulnerabilities in Firefox, Thunderbird and
    SeaMonkey allow remote attackers to cause a denial of service,
    corrupt memory, and possibly execute arbitrary code.

For the stable distribution (sarge) these problems have been fixed in
version 1.0.2-2.sarge1.0.8c.1.

For the unstable distribution (sid) these problems have been fixed in

We recommend that you upgrade your Mozilla Thunderbird packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:     1003 d7261fba347b9876e873f1d424e60190
      Size/MD5 checksum:   519315 066ed351050722c36274e3e837fd174f
      Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4

  Alpha architecture:
      Size/MD5 checksum: 12855288 285e55a20445ea5dffe79de01baf788c
      Size/MD5 checksum:  3280106 0206d9fe08e3da2d4bf919c6b2b54ec7
      Size/MD5 checksum:   152092 c5c984f0f11f94cb263f5bbef367de09
      Size/MD5 checksum:    33520 ed7e6d825f630da666e07914527f2c75
      Size/MD5 checksum:    89492 1e9ed565915dc4327e444ad999cc5daa

  AMD64 architecture:
      Size/MD5 checksum: 12258904 f40f86252184ce7360b2b9d1e58cef8f
      Size/MD5 checksum:  3281164 e4e2160d22d4721508f1762804b3b18b
      Size/MD5 checksum:   151124 a72d17f827929c9189f9ba96ff73c7a1
      Size/MD5 checksum:    33512 bbe0fe4a7e56a138c220790ab9de97a6
      Size/MD5 checksum:    89350 f2b7e1d1d4eb5f1abb2522ddbdb46ff5

  ARM architecture:
      Size/MD5 checksum: 10345146 4c171699433072d443eb7b35a2550fd2
      Size/MD5 checksum:  3272118 a52ad3d2cd1806e936374537e135d7db
      Size/MD5 checksum:   143266 9dedbe9b5f45727a93cfccb5c99bf371
      Size/MD5 checksum:    33522 14d1c0d0af46731075ea7c35c2900258
      Size/MD5 checksum:    81318 81219b4c82896fab12427e42df1b2760

  HP Precision architecture:
      Size/MD5 checksum: 13570024 3a62ee11075402dfad030e2ede937191
      Size/MD5 checksum:  3285124 e9cadee2d32b2bcb56b1278043e97da4
      Size/MD5 checksum:   153296 3fecaa707002afb1ba6854da724ad132
      Size/MD5 checksum:    33520 83e537b9aff4d44fd958043298a1d7f2
      Size/MD5 checksum:    97390 c3ceeedcf00d99d34c7b5f424da7da63

  Intel IA-32 architecture:
      Size/MD5 checksum: 11568436 af1de65bd715970c4432149aec80b2a2
      Size/MD5 checksum:  3507870 5dab89db24f1443fe782dc931f4ee0af
      Size/MD5 checksum:   146732 bc52082cd1ab0f026c401204cd63b4a7
      Size/MD5 checksum:    33518 5d3c9700cce7b9c0261c246ed7b8afd4
      Size/MD5 checksum:    88084 e244c9c8b7224814774bef13f4213d4e

  Intel IA-64 architecture:
      Size/MD5 checksum: 14628630 07bfcc171f449b86b9d62f903e29d506
      Size/MD5 checksum:  3291260 d7186841974796f8f90be26700801a95
      Size/MD5 checksum:   155452 e17eb664e56fcc0809dd36580f92cc1a
      Size/MD5 checksum:    33514 fc890529fdea5526a05ffd16b96f5956
      Size/MD5 checksum:   107220 eb93528d586b050ecc3b60742b4fa344

  Motorola 680x0 architecture:
      Size/MD5 checksum: 10794842 fa716b92e3c7a9d67fad6fd453c78bb4
      Size/MD5 checksum:  3271690 d95eb910dd6d38de41c17fcb6b1c4696
      Size/MD5 checksum:   145054 2b7570676e15cea809905c442f91b5e0
      Size/MD5 checksum:    33550 3db6c520d1c489fb4e17501d19dececf
      Size/MD5 checksum:    82556 32d25c11844a48ed963e3c5c51ff34fc

  Big endian MIPS architecture:
      Size/MD5 checksum: 11948708 4f58ce9668da6a12b823edaa3c8b35b3
      Size/MD5 checksum:  3279410 e639b2bf43eda95d3ca3bb0b9aec6df7
      Size/MD5 checksum:   148042 cb6ee4a9bd4dec3166e48e356b9c3465
      Size/MD5 checksum:    33524 2765555b00f4ed717b34e98c5c0d9c02
      Size/MD5 checksum:    84748 0e934e90bb6bd47c7500fd665728ba27

  Little endian MIPS architecture:
      Size/MD5 checksum: 11817078 4239077894c74444d33063229dd847df
      Size/MD5 checksum:  3280416 ac165850436e63818da8fffe134628d1
      Size/MD5 checksum:   147600 ae6d7ff1b34dddab3d0c18d6e38bc77b
      Size/MD5 checksum:    33518 27bed1b95a4e34a291c7e67c6a9fdd37
      Size/MD5 checksum:    84650 173fefc8b58b15398b3cccad2c812495

  PowerPC architecture:
      Size/MD5 checksum: 10912494 d13ec5b97f5fde0795e5f762330756f6
      Size/MD5 checksum:  3270108 dbd7eb3154db4a379fcfcda6b7d414b9
      Size/MD5 checksum:   145048 b9ab45845f58fb064d7d1ae449481db9
      Size/MD5 checksum:    33526 b5e07e26d215581b4cc0fea6d71beaf3
      Size/MD5 checksum:    81478 b57b8038afbfd5490a6cf847e740ab60

  IBM S/390 architecture:
      Size/MD5 checksum: 12705708 68195861caccd07a18a379ffe2e88403
      Size/MD5 checksum:  3280614 38dec996622a4e1762a1ef683bba9c43
      Size/MD5 checksum:   151436 b54ba7420653e63746d019b979f3ae76
      Size/MD5 checksum:    33516 e24dafe27c103a8d40de9a905b052311
      Size/MD5 checksum:    89290 9daa1eb634834e02aefde0a594bcd0f9

  Sun Sparc architecture:
      Size/MD5 checksum: 11181284 adedd4c6302ddb868a531810d226143a
      Size/MD5 checksum:  3275816 c38922ec47674939277e6984f87c0eb4
      Size/MD5 checksum:   144702 9183a627463aa564a0313d4d361d22f3
      Size/MD5 checksum:    33528 5f87736faa9ee0a9b10e29c48280798a
      Size/MD5 checksum:    83122 72966880dc02a1b472dcac7b1404fa58

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.