USN-400-1: Thunderbird vulnerabilities
5 January 2007
Thunderbird vulnerabilities
Releases
Details
Georgi Guninski and David Bienvenu discovered that long Content-Type and
RFC2047-encoded headers we vulnerable to heap overflows. By tricking
the user into opening a specially crafted email, an attacker could
execute arbitrary code with user privileges. (CVE-2006-6506)
Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges or bypass internal XSS protections
by tricking the user into opening a malicious email containing
JavaScript. Please note that JavaScript is disabled by default for
emails, and it is not recommended to enable it. (CVE-2006-6497,
CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502,
CVE-2006-6503)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.10
-
mozilla-thunderbird
-
1.5.0.9-0ubuntu0.6.10
-
mozilla-thunderbird-dev
-
1.5.0.9-0ubuntu0.6.10
Ubuntu 6.06
-
mozilla-thunderbird
-
1.5.0.9-0ubuntu0.6.06
-
mozilla-thunderbird-dev
-
1.5.0.9-0ubuntu0.6.06
Ubuntu 5.10
-
mozilla-thunderbird
-
1.5.0.9-0ubuntu0.5.10
-
mozilla-thunderbird-dev
-
1.5.0.9-0ubuntu0.5.10
After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.