Linux Security
    Linux Security
    Linux Security

    Debian: New Mozilla Thunderbird packages fix several vulnerabilities

    Date 20 Oct 2005
    Posted By Joe Shakespeare
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 868-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    October 20th, 2005            
    - --------------------------------------------------------------------------
    Package        : mozilla-thunderbird
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE IDs        : CAN-2005-2871 CAN-2005-2701 CAN-2005-2702 CAN-2005-2703
                     CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707
    CERT advisory  : VU#573857
    BugTraq ID     : 14784
    Debian Bug     : 327366 329778
    Several security-related problems have been discovered in Mozilla and
    derived programs.  Some of the following problems don't exactly apply
    to Mozilla Thunderbird, even though the code is present.  In order to
    keep the codebase in sync with upstream it has been altered
    nevertheless.  The Common Vulnerabilities and Exposures project
    identifies the following problems:
        Tom Ferris discovered a bug in the IDN hostname handling of
        Mozilla that allows remote attackers to cause a denial of service
        and possibly execute arbitrary code via a hostname with dashes.
        A buffer overflow allows remote attackers to execute arbitrary
        code via an XBM image file that ends in a large number of spaces
        instead of the expected end tag.
        Mats Palmgren discovered a buffer overflow in the Unicode string
        parser that allowas a specially crafted unicode sequences to
        overflow a buffer and cause arbitrary code to be executed.
        Remote attackers could spoof HTTP headers of XML HTTP requests
        via XMLHttpRequest and possibly use the client to exploit
        vulnerabilities in servers or proxies.
        Remote attackers could spoof DOM objects via an XBL control that
        implements an internal XPCOM interface.
        Georgi Guninski discovered an integer overflow in the JavaScript
        engine that might allow remote attackers to execute arbitrary
        Remote attackers could execute Javascript code with chrome
        privileges via an about: page such as about:mozilla.
        Remote attackers could spawn windows without user interface
        components such as the address and status bar that could be used
        to conduct spoofing or phishing attacks.
        Peter Zelezny discovered that shell metacharacters are not
        properly escaped when they are passed to a shell script and allow
        the execution of arbitrary commands, e.g. when a malicious URL is
        automatically copied from another program into Mozilla as default
    For the stable distribution (sarge) these problems have been fixed in
    version 1.0.2-2.sarge1.0.7.
    For the unstable distribution (sid) these problems have been fixed in
    version 1.0.7-1.
    We recommend that you upgrade your mozilla-thunderbird package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      997 303ed28d7dac19a27a47c23819f80bd7
          Size/MD5 checksum:   210991 79fbaf89373ea1d4698942f289b556d2
          Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4
      Alpha architecture:
          Size/MD5 checksum: 12829612 e50199388042e84de94d2b015484fedc
          Size/MD5 checksum:  3269804 1b50a6a5ca2df178025f4bfb9e72ef7d
          Size/MD5 checksum:   145778 4bffbad43fba608ae24f64b36d936c99
          Size/MD5 checksum:    27290 f979f0128931281a2eb004910b8ba5c8
          Size/MD5 checksum:    83080 d39767ad00fc79d6dd014d20aa2b94e9
      AMD64 architecture:
          Size/MD5 checksum: 12240810 5ac70842faf52d027c0376bc5d4f60e5
          Size/MD5 checksum:  3270622 60d3f2eecebb4806bfaef54db73d26c6
          Size/MD5 checksum:   144798 152536a2fa4d71b41a73f614824809c5
          Size/MD5 checksum:    27280 21aaf659e40e08d2434fca10e8a97a5b
          Size/MD5 checksum:    82972 dc0c6b48cbbdc2c0f39e30ab930ac612
      ARM architecture:
          Size/MD5 checksum: 10328712 2e587b8809aeda36023974b42693e4f2
          Size/MD5 checksum:  3265014 ce2fcff9b73b5c2ba69ad3a8c47fdd83
          Size/MD5 checksum:   136886 b13673a24d714b375b54c17ce7a8a308
          Size/MD5 checksum:    27308 a2a3d30505885a521b703b99b40ebd66
          Size/MD5 checksum:    74954 039d4f13961625a42dbeaac125e0a125
      Intel IA-32 architecture:
          Size/MD5 checksum: 11550326 fc8572c0a89b914fc288fd638e224213
          Size/MD5 checksum:  3497080 02fbded3b5e503def6c29f32c34b24d1
          Size/MD5 checksum:   140456 a90c517acdcaf177b4585cf8f9e35344
          Size/MD5 checksum:    27286 ec039bd40938c0d6bb87874cc8703c25
          Size/MD5 checksum:    81696 ecf0d09362306bcd6c8a65c2e779f792
      Intel IA-64 architecture:
          Size/MD5 checksum: 14602590 f69ca59b99191b96a3a8dbd69f2652b1
          Size/MD5 checksum:  3284198 ea4287ce4ba1b6f36ab96d419528d8e3
          Size/MD5 checksum:   149120 8c288112472ef49da43cdfd24b9524ac
          Size/MD5 checksum:    27286 789de6fbe31cf969076e3ef19bcc9319
          Size/MD5 checksum:   100774 b27c9fb9fef1cb19959953d8cb13e74a
      HP Precision architecture:
          Size/MD5 checksum: 13550208 82ea35b6046092051ee9e7212f160403
          Size/MD5 checksum:  3275452 06778a5a45f737f5f0fffa8f7e2648f1
          Size/MD5 checksum:   147020 9ebbdd2d3bc44c45d0752c62c68e527e
          Size/MD5 checksum:    27294 2a7860aedde7c3535fd19105121c2043
          Size/MD5 checksum:    90916 4a602f8c63d22f80fabb10e2019402e2
      Motorola 680x0 architecture:
          Size/MD5 checksum: 10774276 d3ea2f30a593a8ec702230168a59fc24
          Size/MD5 checksum:  3263230 5757de718fb0c34c9db6affcb554068f
          Size/MD5 checksum:   138658 6f3f3b329ee12275eb6eea3be2d9c59a
          Size/MD5 checksum:    27318 b9e4fe5b540bc544eab853b8077cc2d3
          Size/MD5 checksum:    76178 8aa668acaf233693e6bc55d3d3f983e0
      Big endian MIPS architecture:
          Size/MD5 checksum: 11933302 e1859aeb3cba8f716f6358499c79a6c6
          Size/MD5 checksum:  3269570 383accb42b1d5cb16ed669ebdeea3db0
          Size/MD5 checksum:   141722 f94d559a76c4488fd29ca08f2a5aa2e4
          Size/MD5 checksum:    27288 d44eb068d5211f6ec32a912c7158b95c
          Size/MD5 checksum:    78500 cf4e68bdc3956dc3ad780ed88188667c
      Little endian MIPS architecture:
          Size/MD5 checksum: 11793468 99b3eb9576dc324920f2217c9eb153ef
          Size/MD5 checksum:  3270338 5c13a33de951afe85fed1adb014be4ab
          Size/MD5 checksum:   141292 8fe41e9685ddbdd396fd73354867f49b
          Size/MD5 checksum:    27304 3f96914c37025c901090a86cb6a2fc07
          Size/MD5 checksum:    78350 37448dc23ebcf8d8a7a5431d579c6670
      PowerPC architecture:
          Size/MD5 checksum: 10892752 c4642646840672162e058dd2ca7a3309
          Size/MD5 checksum:  3263168 6e5b333f01170824eaf06b219caea6ab
          Size/MD5 checksum:   138680 ff10d8c364f08f8d6dbf3c01c1aa19df
          Size/MD5 checksum:    27296 1112ef17ba7fcd97b5e9ef96ea2a03ab
          Size/MD5 checksum:    75032 6083403690046238fa54fb19262f19da
      IBM S/390 architecture:
          Size/MD5 checksum: 12685000 d9dcc7200f471840874dd933e327d6ea
          Size/MD5 checksum:  3270478 c7164fc9fc49387916f7d4f2d46d369f
          Size/MD5 checksum:   145108 766d10f0d52d8f877ae10291c7f092a7
          Size/MD5 checksum:    27292 5d5a68b544e284c162476096ea263eda
          Size/MD5 checksum:    82992 8648e3e4157d11344b483d3997156af0
      Sun Sparc architecture:
          Size/MD5 checksum: 11157174 d19fc8bcdc091d58abac26844734568b
          Size/MD5 checksum:  3267158 1f4f1ab1f525c261be893df79a77639b
          Size/MD5 checksum:   138358 eeb8d91cc46daf6020a7f60d17ccdb7c
          Size/MD5 checksum:    27304 9786860d3265d8dd03c964df8afbc5ab
          Size/MD5 checksum:    76782 7231203489126cc4f3ad6d68fa863783
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.