Ubuntu 1254-1: Thunderbird vulnerabilities

    Date 22 Dec 2011
    Posted By LinuxSecurity Advisories
    Multiple vulnerabilities have been fixed in Thunderbird.
    Ubuntu Security Notice USN-1254-1
    December 22, 2011
    thunderbird vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 11.04
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    Multiple vulnerabilities have been fixed in Thunderbird.
    Software Description:
    - thunderbird: Mozilla Open Source mail and newsgroup client
    It was discovered that CVE-2011-3004, which addressed possible privilege
    escalation in addons, also affected Thunderbird 3.1. An attacker could
    potentially exploit a user who had installed an add-on that used
    loadSubscript in vulnerable ways. (CVE-2011-3647)
    Yosuke Hasegawa discovered that the Mozilla browser engine mishandled
    invalid sequences in the Shift-JIS encoding. It may be possible to trigger
    this crash without the use of debugging APIs, which might allow malicious
    websites to exploit this vulnerability. An attacker could possibly use this
    flaw this to steal data or inject malicious scripts into web content.
    Marc Schoenefeld discovered that using Firebug to profile a JavaScript file
    with many functions would cause Firefox to crash. An attacker might be able
    to exploit this without using the debugging APIs which would potentially
    allow an attacker to remotely crash Thunderbird. (CVE-2011-3650)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 11.04:
      thunderbird                     3.1.16+build2+nobinonly-0ubuntu0.11.04.1
    Ubuntu 10.10:
      thunderbird                     3.1.16+build2+nobinonly-0ubuntu0.10.10.1
    Ubuntu 10.04 LTS:
      thunderbird                     3.1.16+build2+nobinonly-0ubuntu0.10.04.1
    After a standard system update you need to restart Thunderbird to make all
    the necessary changes.
      CVE-2011-3647, CVE-2011-3648, CVE-2011-3650
    Package Information:

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"120","title":"Yes","votes":"10","type":"x","order":"1","pct":71.43,"resources":[]},{"id":"121","title":"No ","votes":"4","type":"x","order":"2","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.