Linux Security
Linux Security
Linux Security

Debian: New Mozilla Thunderbird packages fix several vulnerabilities

Date 20 Oct 2005
Posted By Joe Shakespeare
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 868-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
October 20th, 2005            
- --------------------------------------------------------------------------

Package        : mozilla-thunderbird
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CAN-2005-2871 CAN-2005-2701 CAN-2005-2702 CAN-2005-2703
                 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707
CERT advisory  : VU#573857
BugTraq ID     : 14784
Debian Bug     : 327366 329778

Several security-related problems have been discovered in Mozilla and
derived programs.  Some of the following problems don't exactly apply
to Mozilla Thunderbird, even though the code is present.  In order to
keep the codebase in sync with upstream it has been altered
nevertheless.  The Common Vulnerabilities and Exposures project
identifies the following problems:


    Tom Ferris discovered a bug in the IDN hostname handling of
    Mozilla that allows remote attackers to cause a denial of service
    and possibly execute arbitrary code via a hostname with dashes.


    A buffer overflow allows remote attackers to execute arbitrary
    code via an XBM image file that ends in a large number of spaces
    instead of the expected end tag.


    Mats Palmgren discovered a buffer overflow in the Unicode string
    parser that allowas a specially crafted unicode sequences to
    overflow a buffer and cause arbitrary code to be executed.


    Remote attackers could spoof HTTP headers of XML HTTP requests
    via XMLHttpRequest and possibly use the client to exploit
    vulnerabilities in servers or proxies.


    Remote attackers could spoof DOM objects via an XBL control that
    implements an internal XPCOM interface.


    Georgi Guninski discovered an integer overflow in the JavaScript
    engine that might allow remote attackers to execute arbitrary


    Remote attackers could execute Javascript code with chrome
    privileges via an about: page such as about:mozilla.


    Remote attackers could spawn windows without user interface
    components such as the address and status bar that could be used
    to conduct spoofing or phishing attacks.


    Peter Zelezny discovered that shell metacharacters are not
    properly escaped when they are passed to a shell script and allow
    the execution of arbitrary commands, e.g. when a malicious URL is
    automatically copied from another program into Mozilla as default

For the stable distribution (sarge) these problems have been fixed in
version 1.0.2-2.sarge1.0.7.

For the unstable distribution (sid) these problems have been fixed in
version 1.0.7-1.

We recommend that you upgrade your mozilla-thunderbird package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      997 303ed28d7dac19a27a47c23819f80bd7
      Size/MD5 checksum:   210991 79fbaf89373ea1d4698942f289b556d2
      Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4

  Alpha architecture:
      Size/MD5 checksum: 12829612 e50199388042e84de94d2b015484fedc
      Size/MD5 checksum:  3269804 1b50a6a5ca2df178025f4bfb9e72ef7d
      Size/MD5 checksum:   145778 4bffbad43fba608ae24f64b36d936c99
      Size/MD5 checksum:    27290 f979f0128931281a2eb004910b8ba5c8
      Size/MD5 checksum:    83080 d39767ad00fc79d6dd014d20aa2b94e9

  AMD64 architecture:
      Size/MD5 checksum: 12240810 5ac70842faf52d027c0376bc5d4f60e5
      Size/MD5 checksum:  3270622 60d3f2eecebb4806bfaef54db73d26c6
      Size/MD5 checksum:   144798 152536a2fa4d71b41a73f614824809c5
      Size/MD5 checksum:    27280 21aaf659e40e08d2434fca10e8a97a5b
      Size/MD5 checksum:    82972 dc0c6b48cbbdc2c0f39e30ab930ac612

  ARM architecture:
      Size/MD5 checksum: 10328712 2e587b8809aeda36023974b42693e4f2
      Size/MD5 checksum:  3265014 ce2fcff9b73b5c2ba69ad3a8c47fdd83
      Size/MD5 checksum:   136886 b13673a24d714b375b54c17ce7a8a308
      Size/MD5 checksum:    27308 a2a3d30505885a521b703b99b40ebd66
      Size/MD5 checksum:    74954 039d4f13961625a42dbeaac125e0a125

  Intel IA-32 architecture:
      Size/MD5 checksum: 11550326 fc8572c0a89b914fc288fd638e224213
      Size/MD5 checksum:  3497080 02fbded3b5e503def6c29f32c34b24d1
      Size/MD5 checksum:   140456 a90c517acdcaf177b4585cf8f9e35344
      Size/MD5 checksum:    27286 ec039bd40938c0d6bb87874cc8703c25
      Size/MD5 checksum:    81696 ecf0d09362306bcd6c8a65c2e779f792

  Intel IA-64 architecture:
      Size/MD5 checksum: 14602590 f69ca59b99191b96a3a8dbd69f2652b1
      Size/MD5 checksum:  3284198 ea4287ce4ba1b6f36ab96d419528d8e3
      Size/MD5 checksum:   149120 8c288112472ef49da43cdfd24b9524ac
      Size/MD5 checksum:    27286 789de6fbe31cf969076e3ef19bcc9319
      Size/MD5 checksum:   100774 b27c9fb9fef1cb19959953d8cb13e74a

  HP Precision architecture:
      Size/MD5 checksum: 13550208 82ea35b6046092051ee9e7212f160403
      Size/MD5 checksum:  3275452 06778a5a45f737f5f0fffa8f7e2648f1
      Size/MD5 checksum:   147020 9ebbdd2d3bc44c45d0752c62c68e527e
      Size/MD5 checksum:    27294 2a7860aedde7c3535fd19105121c2043
      Size/MD5 checksum:    90916 4a602f8c63d22f80fabb10e2019402e2

  Motorola 680x0 architecture:
      Size/MD5 checksum: 10774276 d3ea2f30a593a8ec702230168a59fc24
      Size/MD5 checksum:  3263230 5757de718fb0c34c9db6affcb554068f
      Size/MD5 checksum:   138658 6f3f3b329ee12275eb6eea3be2d9c59a
      Size/MD5 checksum:    27318 b9e4fe5b540bc544eab853b8077cc2d3
      Size/MD5 checksum:    76178 8aa668acaf233693e6bc55d3d3f983e0

  Big endian MIPS architecture:
      Size/MD5 checksum: 11933302 e1859aeb3cba8f716f6358499c79a6c6
      Size/MD5 checksum:  3269570 383accb42b1d5cb16ed669ebdeea3db0
      Size/MD5 checksum:   141722 f94d559a76c4488fd29ca08f2a5aa2e4
      Size/MD5 checksum:    27288 d44eb068d5211f6ec32a912c7158b95c
      Size/MD5 checksum:    78500 cf4e68bdc3956dc3ad780ed88188667c

  Little endian MIPS architecture:
      Size/MD5 checksum: 11793468 99b3eb9576dc324920f2217c9eb153ef
      Size/MD5 checksum:  3270338 5c13a33de951afe85fed1adb014be4ab
      Size/MD5 checksum:   141292 8fe41e9685ddbdd396fd73354867f49b
      Size/MD5 checksum:    27304 3f96914c37025c901090a86cb6a2fc07
      Size/MD5 checksum:    78350 37448dc23ebcf8d8a7a5431d579c6670

  PowerPC architecture:
      Size/MD5 checksum: 10892752 c4642646840672162e058dd2ca7a3309
      Size/MD5 checksum:  3263168 6e5b333f01170824eaf06b219caea6ab
      Size/MD5 checksum:   138680 ff10d8c364f08f8d6dbf3c01c1aa19df
      Size/MD5 checksum:    27296 1112ef17ba7fcd97b5e9ef96ea2a03ab
      Size/MD5 checksum:    75032 6083403690046238fa54fb19262f19da

  IBM S/390 architecture:
      Size/MD5 checksum: 12685000 d9dcc7200f471840874dd933e327d6ea
      Size/MD5 checksum:  3270478 c7164fc9fc49387916f7d4f2d46d369f
      Size/MD5 checksum:   145108 766d10f0d52d8f877ae10291c7f092a7
      Size/MD5 checksum:    27292 5d5a68b544e284c162476096ea263eda
      Size/MD5 checksum:    82992 8648e3e4157d11344b483d3997156af0

  Sun Sparc architecture:
      Size/MD5 checksum: 11157174 d19fc8bcdc091d58abac26844734568b
      Size/MD5 checksum:  3267158 1f4f1ab1f525c261be893df79a77639b
      Size/MD5 checksum:   138358 eeb8d91cc46daf6020a7f60d17ccdb7c
      Size/MD5 checksum:    27304 9786860d3265d8dd03c964df8afbc5ab
      Size/MD5 checksum:    76782 7231203489126cc4f3ad6d68fa863783

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"43","type":"x","order":"1","pct":81.13,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"5","type":"x","order":"2","pct":9.43,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":9.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.