Rapid7 Vulnerability & Exploit Database

RHSA-2012:1211: thunderbird security update

Back to Search

RHSA-2012:1211: thunderbird security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
08/29/2012
Created
07/25/2018
Added
08/30/2012
Modified
07/04/2017

Description

Mozilla Thunderbird is a standalone mail and newsgroup client.Several flaws were found in the processing of malformed content. Maliciouscontent could cause Thunderbird to crash or, potentially, execute arbitrarycode with the privileges of the user running Thunderbird. (CVE-2012-1970,CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)Content containing a malicious Scalable Vector Graphics (SVG) image filecould cause Thunderbird to crash or, potentially, execute arbitrary codewith the privileges of the user running Thunderbird. (CVE-2012-3969,CVE-2012-3970)Two flaws were found in the way Thunderbird rendered certain images usingWebGL. Malicious content could cause Thunderbird to crash or, under certainconditions, possibly execute arbitrary code with the privileges of the userrunning Thunderbird. (CVE-2012-3967, CVE-2012-3968)A flaw was found in the way Thunderbird decoded embedded bitmap images inIcon Format (ICO) files. Content containing a malicious ICO file couldcause Thunderbird to crash or, under certain conditions, possibly executearbitrary code with the privileges of the user running Thunderbird.(CVE-2012-3966)A flaw was found in the way the "eval" command was handled by theThunderbird Error Console. Running "eval" in the Error Console whileviewing malicious content could possibly cause Thunderbird to executearbitrary code with the privileges of the user running Thunderbird.(CVE-2012-3980)An out-of-bounds memory read flaw was found in the way Thunderbird used theformat-number feature of XSLT (Extensible Stylesheet LanguageTransformations). Malicious content could possibly cause an informationleak, or cause Thunderbird to crash. (CVE-2012-3972)A flaw was found in the location object implementation in Thunderbird.Malicious content could use this flaw to possibly allow restricted contentto be loaded. (CVE-2012-3978)Red Hat would like to thank the Mozilla project for reporting these issues.Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, JohnSchoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, FrédéricHoguin, miaubiz, Arthur Gerkis, Nicolas Grégoire, moz_bug_r_a4, and ColbyRussell as the original reporters of these issues.Note: All issues except CVE-2012-3969 and CVE-2012-3970 cannot be exploitedby a specially-crafted HTML mail message as JavaScript is disabled bydefault for mail messages. They could be exploited another way inThunderbird, for example, when viewing the full remote content of an RSSfeed.All Thunderbird users should upgrade to this updated package, whichcontains Thunderbird version 10.0.7 ESR, which corrects these issues. Afterinstalling the update, Thunderbird must be restarted for the changes totake effect.

Solution(s)

  • redhat-upgrade-thunderbird
  • redhat-upgrade-thunderbird-debuginfo

References

  • redhat-upgrade-thunderbird
  • redhat-upgrade-thunderbird-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;