Rapid7 Vulnerability & Exploit Database

RHSA-2011:1342: thunderbird security update

Back to Search

RHSA-2011:1342: thunderbird security update



Mozilla Thunderbird is a standalone mail and newsgroup client.Several flaws were found in the processing of malformed HTML content. AnHTML mail message containing malicious content could cause Thunderbird tocrash or, potentially, execute arbitrary code with the privileges of theuser running Thunderbird. (CVE-2011-2995)A flaw was found in the way Thunderbird processed the "Enter" keypressevent. A malicious HTML mail message could present a download dialog whilethe key is pressed, activating the default "Open" action. A remote attackercould exploit this vulnerability by causing the mail client to openmalicious web content. (CVE-2011-2372)A flaw was found in the way Thunderbird handled Location headers inredirect responses. Two copies of this header with different values couldbe a symptom of a CRLF injection attack against a vulnerable server.Thunderbird now treats two copies of the Location, Content-Length, orContent-Disposition header as an error condition. (CVE-2011-3000)A flaw was found in the way Thunderbird handled frame objects with certainnames. An attacker could use this flaw to cause a plug-in to grant itscontent access to another site or the local file system, violating thesame-origin policy. (CVE-2011-2999)An integer underflow flaw was found in the way Thunderbird handled largeJavaScript regular expressions. An HTML mail message containing maliciousJavaScript could cause Thunderbird to access already freed memory, causingThunderbird to crash or, potentially, execute arbitrary code with theprivileges of the user running Thunderbird. (CVE-2011-2998)All Thunderbird users should upgrade to this updated package, whichresolves these issues. All running instances of Thunderbird must berestarted for the update to take effect.


  • redhat-upgrade-thunderbird
  • redhat-upgrade-thunderbird-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center