Rapid7 Vulnerability & Exploit Database

CESA-2007:1083: RHSA-2007:1083

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

CESA-2007:1083: RHSA-2007:1083

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
11/26/2007
Created
07/25/2018
Added
03/12/2010
Modified
08/29/2017

Description

Moderate: thunderbird security updateMozilla Thunderbird is a standalone mail and newsgroup client.A cross-site scripting flaw was found in the way Thunderbird handled thejar: URI scheme. It may be possible for a malicious HTML mail message toleverage this flaw, and conduct a cross-site scripting attack against auser running Thunderbird. (CVE-2007-5947)Several flaws were found in the way Thunderbird processed certain malformedHTML mail content. A HTML mail message containing malicious content couldcause Thunderbird to crash, or potentially execute arbitrary code as theuser running Thunderbird. (CVE-2007-5959)A race condition existed when Thunderbird set the "window.location"property when displaying HTML mail content. This flaw could allow a HTMLmail message to set an arbitrary Referer header, which may lead to aCross-site Request Forgery (CSRF) attack against websites that rely only onthe Referer header for protection. (CVE-2007-5960) All users of thunderbird are advised to upgrade to these updated packages,which contain backported patches to resolve these issues.

Solution(s)

  • centos-upgrade-thunderbird

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;