USN-400-1: Thunderbird vulnerabilities

05 January 2007

Thunderbird vulnerabilities

Releases

Details

Georgi Guninski and David Bienvenu discovered that long Content-Type and
RFC2047-encoded headers we vulnerable to heap overflows. By tricking
the user into opening a specially crafted email, an attacker could
execute arbitrary code with user privileges. (CVE-2006-6506)

Various flaws have been reported that allow an attacker to execute
arbitrary code with user privileges or bypass internal XSS protections
by tricking the user into opening a malicious email containing
JavaScript. Please note that JavaScript is disabled by default for
emails, and it is not recommended to enable it. (CVE-2006-6497,
CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502,
CVE-2006-6503)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.10
  • mozilla-thunderbird - 1.5.0.9-0ubuntu0.6.10
  • mozilla-thunderbird-dev - 1.5.0.9-0ubuntu0.6.10
Ubuntu 6.06
  • mozilla-thunderbird - 1.5.0.9-0ubuntu0.6.06
  • mozilla-thunderbird-dev - 1.5.0.9-0ubuntu0.6.06
Ubuntu 5.10
  • mozilla-thunderbird - 1.5.0.9-0ubuntu0.5.10
  • mozilla-thunderbird-dev - 1.5.0.9-0ubuntu0.5.10

After a standard system upgrade you need to restart Thunderbird to
effect the necessary changes.

Related notices

  • USN-398-1: firefox, libnss3, libnss-dev, firefox-dev, libnspr4, libnspr-dev
  • USN-398-2: firefox, libnss3, libnss-dev, firefox-dev, libnspr4, libnspr-dev