Linux Security
    Linux Security
    Linux Security

    Debian: Mozilla Thunderbird fix several vulnerabilities DSA-1191-1

    Date 05 Oct 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1191-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    October 5th, 2006             
    - --------------------------------------------------------------------------
    Package        : mozilla-thunderbird
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE IDs        : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566
                     CVE-2006-4568 CVE-2006-4570 CVE-2006-4571
    BugTraq ID     : 20042
    Several security related problems have been discovered in Mozilla and
    derived products such as Mozilla Thunderbird.  The Common
    Vulnerabilities and Exposures project identifies the following
        Fernando Ribeiro discovered that a vulnerability in the getRawDER
        functionallows remote attackers to cause a denial of service
        (hang) and possibly execute arbitrary code.
        Daniel Bleichenbacher recently described an implementation error
        in RSA signature verification that cause the application to
        incorrectly trust SSL certificates.
    CVE-2006-4565, CVE-2006-4566
        Priit Laes reported that that a JavaScript regular expression can
        trigger a heap-based buffer overflow which allows remote attackers
        to cause a denial of service and possibly execute arbitrary code.
        A vulnerability has been discovered that allows remote attackers
        to bypass the security model and inject content into the sub-frame
        of another site.
        Georgi Guninski demonstrated that even with JavaScript disabled in
        mail (the default) an attacker can still execute JavaScript when a
        mail message is viewed, replied to, or forwarded.
        Multiple unspecified vulnerabilities in Firefox, Thunderbird and
        SeaMonkey allow remote attackers to cause a denial of service,
        corrupt memory, and possibly execute arbitrary code.
    For the stable distribution (sarge) these problems have been fixed in
    version 1.0.2-2.sarge1.0.8c.1.
    For the unstable distribution (sid) these problems have been fixed in
    We recommend that you upgrade your Mozilla Thunderbird packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     1003 d7261fba347b9876e873f1d424e60190
          Size/MD5 checksum:   519315 066ed351050722c36274e3e837fd174f
          Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4
      Alpha architecture:
          Size/MD5 checksum: 12855288 285e55a20445ea5dffe79de01baf788c
          Size/MD5 checksum:  3280106 0206d9fe08e3da2d4bf919c6b2b54ec7
          Size/MD5 checksum:   152092 c5c984f0f11f94cb263f5bbef367de09
          Size/MD5 checksum:    33520 ed7e6d825f630da666e07914527f2c75
          Size/MD5 checksum:    89492 1e9ed565915dc4327e444ad999cc5daa
      AMD64 architecture:
          Size/MD5 checksum: 12258904 f40f86252184ce7360b2b9d1e58cef8f
          Size/MD5 checksum:  3281164 e4e2160d22d4721508f1762804b3b18b
          Size/MD5 checksum:   151124 a72d17f827929c9189f9ba96ff73c7a1
          Size/MD5 checksum:    33512 bbe0fe4a7e56a138c220790ab9de97a6
          Size/MD5 checksum:    89350 f2b7e1d1d4eb5f1abb2522ddbdb46ff5
      ARM architecture:
          Size/MD5 checksum: 10345146 4c171699433072d443eb7b35a2550fd2
          Size/MD5 checksum:  3272118 a52ad3d2cd1806e936374537e135d7db
          Size/MD5 checksum:   143266 9dedbe9b5f45727a93cfccb5c99bf371
          Size/MD5 checksum:    33522 14d1c0d0af46731075ea7c35c2900258
          Size/MD5 checksum:    81318 81219b4c82896fab12427e42df1b2760
      HP Precision architecture:
          Size/MD5 checksum: 13570024 3a62ee11075402dfad030e2ede937191
          Size/MD5 checksum:  3285124 e9cadee2d32b2bcb56b1278043e97da4
          Size/MD5 checksum:   153296 3fecaa707002afb1ba6854da724ad132
          Size/MD5 checksum:    33520 83e537b9aff4d44fd958043298a1d7f2
          Size/MD5 checksum:    97390 c3ceeedcf00d99d34c7b5f424da7da63
      Intel IA-32 architecture:
          Size/MD5 checksum: 11568436 af1de65bd715970c4432149aec80b2a2
          Size/MD5 checksum:  3507870 5dab89db24f1443fe782dc931f4ee0af
          Size/MD5 checksum:   146732 bc52082cd1ab0f026c401204cd63b4a7
          Size/MD5 checksum:    33518 5d3c9700cce7b9c0261c246ed7b8afd4
          Size/MD5 checksum:    88084 e244c9c8b7224814774bef13f4213d4e
      Intel IA-64 architecture:
          Size/MD5 checksum: 14628630 07bfcc171f449b86b9d62f903e29d506
          Size/MD5 checksum:  3291260 d7186841974796f8f90be26700801a95
          Size/MD5 checksum:   155452 e17eb664e56fcc0809dd36580f92cc1a
          Size/MD5 checksum:    33514 fc890529fdea5526a05ffd16b96f5956
          Size/MD5 checksum:   107220 eb93528d586b050ecc3b60742b4fa344
      Motorola 680x0 architecture:
          Size/MD5 checksum: 10794842 fa716b92e3c7a9d67fad6fd453c78bb4
          Size/MD5 checksum:  3271690 d95eb910dd6d38de41c17fcb6b1c4696
          Size/MD5 checksum:   145054 2b7570676e15cea809905c442f91b5e0
          Size/MD5 checksum:    33550 3db6c520d1c489fb4e17501d19dececf
          Size/MD5 checksum:    82556 32d25c11844a48ed963e3c5c51ff34fc
      Big endian MIPS architecture:
          Size/MD5 checksum: 11948708 4f58ce9668da6a12b823edaa3c8b35b3
          Size/MD5 checksum:  3279410 e639b2bf43eda95d3ca3bb0b9aec6df7
          Size/MD5 checksum:   148042 cb6ee4a9bd4dec3166e48e356b9c3465
          Size/MD5 checksum:    33524 2765555b00f4ed717b34e98c5c0d9c02
          Size/MD5 checksum:    84748 0e934e90bb6bd47c7500fd665728ba27
      Little endian MIPS architecture:
          Size/MD5 checksum: 11817078 4239077894c74444d33063229dd847df
          Size/MD5 checksum:  3280416 ac165850436e63818da8fffe134628d1
          Size/MD5 checksum:   147600 ae6d7ff1b34dddab3d0c18d6e38bc77b
          Size/MD5 checksum:    33518 27bed1b95a4e34a291c7e67c6a9fdd37
          Size/MD5 checksum:    84650 173fefc8b58b15398b3cccad2c812495
      PowerPC architecture:
          Size/MD5 checksum: 10912494 d13ec5b97f5fde0795e5f762330756f6
          Size/MD5 checksum:  3270108 dbd7eb3154db4a379fcfcda6b7d414b9
          Size/MD5 checksum:   145048 b9ab45845f58fb064d7d1ae449481db9
          Size/MD5 checksum:    33526 b5e07e26d215581b4cc0fea6d71beaf3
          Size/MD5 checksum:    81478 b57b8038afbfd5490a6cf847e740ab60
      IBM S/390 architecture:
          Size/MD5 checksum: 12705708 68195861caccd07a18a379ffe2e88403
          Size/MD5 checksum:  3280614 38dec996622a4e1762a1ef683bba9c43
          Size/MD5 checksum:   151436 b54ba7420653e63746d019b979f3ae76
          Size/MD5 checksum:    33516 e24dafe27c103a8d40de9a905b052311
          Size/MD5 checksum:    89290 9daa1eb634834e02aefde0a594bcd0f9
      Sun Sparc architecture:
          Size/MD5 checksum: 11181284 adedd4c6302ddb868a531810d226143a
          Size/MD5 checksum:  3275816 c38922ec47674939277e6984f87c0eb4
          Size/MD5 checksum:   144702 9183a627463aa564a0313d4d361d22f3
          Size/MD5 checksum:    33528 5f87736faa9ee0a9b10e29c48280798a
          Size/MD5 checksum:    83122 72966880dc02a1b472dcac7b1404fa58
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    I agree with Linus Torvalds - Apple's new M1-powered laptops should run on Linux.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"158","title":"True","votes":"12","type":"x","order":"1","pct":6.59,"resources":[]},{"id":"159","title":"False","votes":"170","type":"x","order":"2","pct":93.41,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    You have already voted for this poll.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.