Skip to navigation

Security Advisory Moderate: thunderbird security update

Advisory: RHSA-2008:0616-9
Type: Security Advisory
Severity: Moderate
Issued on: 2008-07-23
Last updated on: 2008-07-23
Affected Products: RHEL Optional Productivity Applications (v. 5 server)
RHEL Optional Productivity Applications EUS (v. 5.2.z server)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.6.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.6.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2008-2785
CVE-2008-2798
CVE-2008-2799
CVE-2008-2800
CVE-2008-2801
CVE-2008-2802
CVE-2008-2803
CVE-2008-2805
CVE-2008-2807
CVE-2008-2808
CVE-2008-2809
CVE-2008-2810
CVE-2008-2811

Details

Updated thunderbird packages that fix a security issue are now available
for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Multiple flaws were found in the processing of malformed JavaScript
content. An HTML mail containing such malicious content could cause
Thunderbird to crash or, potentially, execute arbitrary code as the user
running Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)

Several flaws were found in the processing of malformed HTML content. An
HTML mail containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code as the user running Thunderbird.
(CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)

Several flaws were found in the way malformed HTML content was displayed.
An HTML mail containing specially-crafted content could, potentially, trick
a Thunderbird user into surrendering sensitive information. (CVE-2008-2800)

Two local file disclosure flaws were found in Thunderbird. An HTML mail
containing malicious content could cause Thunderbird to reveal the contents
of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)

A flaw was found in the way a malformed .properties file was processed by
Thunderbird. A malicious extension could read uninitialized memory,
possibly leaking sensitive data to the extension. (CVE-2008-2807)

A flaw was found in the way Thunderbird escaped a listing of local file
names. If a user could be tricked into listing a local directory containing
malicious file names, arbitrary JavaScript could be run with the
permissions of the user running Thunderbird. (CVE-2008-2808)

A flaw was found in the way Thunderbird displayed information about
self-signed certificates. It was possible for a self-signed certificate to
contain multiple alternate name entries, which were not all displayed to
the user, allowing them to mistakenly extend trust to an unknown site.
(CVE-2008-2809)

Note: JavaScript support is disabled by default in Thunderbird. The above
issues are not exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to these updated packages, which
contain backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
thunderbird-2.0.0.16-1.el5.src.rpm
File outdated by:  RHSA-2009:0002
    MD5: 34c98f411537cc3afc91306692826acb
 
IA-32:
thunderbird-2.0.0.16-1.el5.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 63c6cce483a8d832331bfb15ba3b6165
 
x86_64:
thunderbird-2.0.0.16-1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 1a1a2feafb00cd1e825330d13afeefe8
 
RHEL Optional Productivity Applications EUS (v. 5.2.z server)

SRPMS:
thunderbird-2.0.0.16-1.el5.src.rpm
File outdated by:  RHSA-2009:0002
    MD5: 34c98f411537cc3afc91306692826acb
 
IA-32:
thunderbird-2.0.0.16-1.el5.i386.rpm
File outdated by:  RHSA-2009:0002
    MD5: 63c6cce483a8d832331bfb15ba3b6165
 
x86_64:
thunderbird-2.0.0.16-1.el5.x86_64.rpm
File outdated by:  RHSA-2009:0002
    MD5: 1a1a2feafb00cd1e825330d13afeefe8
 
Red Hat Desktop (v. 4)

SRPMS:
thunderbird-1.5.0.12-14.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 01c0afc81af2b0bf41ef62a215bfeaa8
 
IA-32:
thunderbird-1.5.0.12-14.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: a12a5128f6e1bb9bc8c6b90c149f38a7
 
x86_64:
thunderbird-1.5.0.12-14.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: d0e555c837b494473ed869172ce684e0
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
thunderbird-1.5.0.12-14.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 01c0afc81af2b0bf41ef62a215bfeaa8
 
IA-32:
thunderbird-1.5.0.12-14.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: a12a5128f6e1bb9bc8c6b90c149f38a7
 
IA-64:
thunderbird-1.5.0.12-14.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 0c90a2ade6cc3e0b4f392815190444f3
 
PPC:
thunderbird-1.5.0.12-14.el4.ppc.rpm
File outdated by:  RHSA-2012:0085
    MD5: 199224968a40f1f22a41378d7165bf2c
 
s390:
thunderbird-1.5.0.12-14.el4.s390.rpm
File outdated by:  RHSA-2012:0085
    MD5: 65f182e19c174192527239331b5992d8
 
s390x:
thunderbird-1.5.0.12-14.el4.s390x.rpm
File outdated by:  RHSA-2012:0085
    MD5: 491fbfc34abe2a88379f267ff4217acb
 
x86_64:
thunderbird-1.5.0.12-14.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: d0e555c837b494473ed869172ce684e0
 
Red Hat Enterprise Linux AS (v. 4.6.z)

SRPMS:
thunderbird-1.5.0.12-14.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 01c0afc81af2b0bf41ef62a215bfeaa8
 
IA-32:
thunderbird-1.5.0.12-14.el4.i386.rpm     MD5: a12a5128f6e1bb9bc8c6b90c149f38a7
 
IA-64:
thunderbird-1.5.0.12-14.el4.ia64.rpm     MD5: 0c90a2ade6cc3e0b4f392815190444f3
 
PPC:
thunderbird-1.5.0.12-14.el4.ppc.rpm     MD5: 199224968a40f1f22a41378d7165bf2c
 
s390:
thunderbird-1.5.0.12-14.el4.s390.rpm     MD5: 65f182e19c174192527239331b5992d8
 
s390x:
thunderbird-1.5.0.12-14.el4.s390x.rpm     MD5: 491fbfc34abe2a88379f267ff4217acb
 
x86_64:
thunderbird-1.5.0.12-14.el4.x86_64.rpm     MD5: d0e555c837b494473ed869172ce684e0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
thunderbird-2.0.0.16-1.el5.src.rpm
File outdated by:  RHSA-2009:0002
    MD5: 34c98f411537cc3afc91306692826acb
 
IA-32:
thunderbird-2.0.0.16-1.el5.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 63c6cce483a8d832331bfb15ba3b6165
 
x86_64:
thunderbird-2.0.0.16-1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 1a1a2feafb00cd1e825330d13afeefe8
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
thunderbird-1.5.0.12-14.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 01c0afc81af2b0bf41ef62a215bfeaa8
 
IA-32:
thunderbird-1.5.0.12-14.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: a12a5128f6e1bb9bc8c6b90c149f38a7
 
IA-64:
thunderbird-1.5.0.12-14.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 0c90a2ade6cc3e0b4f392815190444f3
 
x86_64:
thunderbird-1.5.0.12-14.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: d0e555c837b494473ed869172ce684e0
 
Red Hat Enterprise Linux ES (v. 4.6.z)

SRPMS:
thunderbird-1.5.0.12-14.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 01c0afc81af2b0bf41ef62a215bfeaa8
 
IA-32:
thunderbird-1.5.0.12-14.el4.i386.rpm     MD5: a12a5128f6e1bb9bc8c6b90c149f38a7
 
IA-64:
thunderbird-1.5.0.12-14.el4.ia64.rpm     MD5: 0c90a2ade6cc3e0b4f392815190444f3
 
x86_64:
thunderbird-1.5.0.12-14.el4.x86_64.rpm     MD5: d0e555c837b494473ed869172ce684e0
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
thunderbird-1.5.0.12-14.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 01c0afc81af2b0bf41ef62a215bfeaa8
 
IA-32:
thunderbird-1.5.0.12-14.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: a12a5128f6e1bb9bc8c6b90c149f38a7
 
IA-64:
thunderbird-1.5.0.12-14.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 0c90a2ade6cc3e0b4f392815190444f3
 
x86_64:
thunderbird-1.5.0.12-14.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: d0e555c837b494473ed869172ce684e0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

452204 - CVE-2008-2785 mozilla: CSS reference counter overflow (ZDI-CAN-349)
452597 - CVE-2008-2798 Firefox malformed web content flaws
452598 - CVE-2008-2799 Firefox javascript arbitrary code execution
452599 - CVE-2008-2800 Firefox XSS attacks
452600 - CVE-2008-2802 Firefox arbitrary JavaScript code execution
452602 - CVE-2008-2803 Firefox javascript arbitrary code execution
452604 - CVE-2008-2805 Firefox arbitrary file disclosure
452605 - CVE-2008-2801 Firefox arbitrary signed JAR code execution
452709 - CVE-2008-2807 Firefox .properties memory leak
452710 - CVE-2008-2808 Firefox file location escaping flaw
452711 - CVE-2008-2809 Firefox self signed certificate flaw
452712 - CVE-2008-2810 Firefox arbitrary file disclosure
453007 - CVE-2008-2811 Firefox block reflow flaw


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/