Skip to navigation

Security Advisory Moderate: thunderbird security update

Advisory: RHSA-2010:0968-1
Type: Security Advisory
Severity: Moderate
Issued on: 2010-12-09
Last updated on: 2010-12-09
Affected Products: RHEL Optional Productivity Applications (v. 5 server)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2010-3767
CVE-2010-3772
CVE-2010-3776

Details

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed HTML content. HTML
containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user running
Thunderbird. (CVE-2010-3767, CVE-2010-3772, CVE-2010-3776)

Note: JavaScript support is disabled by default in Thunderbird. The above
issues are not exploitable unless JavaScript is enabled.

All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
thunderbird-2.0.0.24-13.el5_5.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: cf72485c95901947630e2e5e417ecf46
SHA-256: e95d5d482c75cc5732a46d2228f2475b3643d2a5edaeb80adce47f2fb9916dcc
 
IA-32:
thunderbird-2.0.0.24-13.el5_5.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4187c56e127407b07cc8345f5f19435f
SHA-256: 1cdba9ead54500e8e4abfba60325a452195b6b6ed6284bde25b805ec8c8a1480
 
x86_64:
thunderbird-2.0.0.24-13.el5_5.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 3dd11fbaf13f652e8cad1b5d7538c763
SHA-256: 372115d2466d8d8770bbc8b9345d618894548ef96cc5b503d261419edadf0e3c
 
Red Hat Desktop (v. 4)

IA-32:
thunderbird-1.5.0.12-34.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5f2dc7be18f9a3586665110a95c7c1a4
SHA-256: 76c23ba2f88dfbfccee0b13c0793a016f15d0b241fb817b44b5578847e09a3a9
 
x86_64:
thunderbird-1.5.0.12-34.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5a675ba842f231382836252d12af7068
SHA-256: ed0afc400be9d3729a035380f7f38a9b2d540e97901050afe7e58c03e47bcf26
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
thunderbird-1.5.0.12-34.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5f2dc7be18f9a3586665110a95c7c1a4
SHA-256: 76c23ba2f88dfbfccee0b13c0793a016f15d0b241fb817b44b5578847e09a3a9
 
IA-64:
thunderbird-1.5.0.12-34.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 1553b669d9f6784558bdf54c268fda24
SHA-256: 1d839e6669b2ac2b6d32edd533512c11c51c2bf6db3c842bd514fd3fd97dd89f
 
PPC:
thunderbird-1.5.0.12-34.el4.ppc.rpm
File outdated by:  RHSA-2012:0085
    MD5: 62d1e051edef487232b5bdd61cca7b9f
SHA-256: 07ace6cfac0bce0bbb3547f686ca7e400668cceb2208ea8d5616354c3b01dabb
 
s390:
thunderbird-1.5.0.12-34.el4.s390.rpm
File outdated by:  RHSA-2012:0085
    MD5: bdf1303c17d7f1bdbf2b88aa9889538f
SHA-256: 8b5472da088a75d319e5be543290d4be060fed8f9403d563a52222818e239de1
 
s390x:
thunderbird-1.5.0.12-34.el4.s390x.rpm
File outdated by:  RHSA-2012:0085
    MD5: 447561a127deb9bf9f465d1bb183e349
SHA-256: a8dac4d27daf2aa45706bc2bd46bab9c08684f7a955c2d538a0db1f2782a1a29
 
x86_64:
thunderbird-1.5.0.12-34.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5a675ba842f231382836252d12af7068
SHA-256: ed0afc400be9d3729a035380f7f38a9b2d540e97901050afe7e58c03e47bcf26
 
Red Hat Enterprise Linux AS (v. 4.8.z)

IA-32:
thunderbird-1.5.0.12-34.el4.i386.rpm
File outdated by:  RHSA-2011:0887
    MD5: 5f2dc7be18f9a3586665110a95c7c1a4
SHA-256: 76c23ba2f88dfbfccee0b13c0793a016f15d0b241fb817b44b5578847e09a3a9
 
IA-64:
thunderbird-1.5.0.12-34.el4.ia64.rpm
File outdated by:  RHSA-2011:0887
    MD5: 1553b669d9f6784558bdf54c268fda24
SHA-256: 1d839e6669b2ac2b6d32edd533512c11c51c2bf6db3c842bd514fd3fd97dd89f
 
PPC:
thunderbird-1.5.0.12-34.el4.ppc.rpm
File outdated by:  RHSA-2011:0887
    MD5: 62d1e051edef487232b5bdd61cca7b9f
SHA-256: 07ace6cfac0bce0bbb3547f686ca7e400668cceb2208ea8d5616354c3b01dabb
 
s390:
thunderbird-1.5.0.12-34.el4.s390.rpm
File outdated by:  RHSA-2011:0887
    MD5: bdf1303c17d7f1bdbf2b88aa9889538f
SHA-256: 8b5472da088a75d319e5be543290d4be060fed8f9403d563a52222818e239de1
 
s390x:
thunderbird-1.5.0.12-34.el4.s390x.rpm
File outdated by:  RHSA-2011:0887
    MD5: 447561a127deb9bf9f465d1bb183e349
SHA-256: a8dac4d27daf2aa45706bc2bd46bab9c08684f7a955c2d538a0db1f2782a1a29
 
x86_64:
thunderbird-1.5.0.12-34.el4.x86_64.rpm
File outdated by:  RHSA-2011:0887
    MD5: 5a675ba842f231382836252d12af7068
SHA-256: ed0afc400be9d3729a035380f7f38a9b2d540e97901050afe7e58c03e47bcf26
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
thunderbird-2.0.0.24-13.el5_5.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: cf72485c95901947630e2e5e417ecf46
SHA-256: e95d5d482c75cc5732a46d2228f2475b3643d2a5edaeb80adce47f2fb9916dcc
 
IA-32:
thunderbird-2.0.0.24-13.el5_5.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4187c56e127407b07cc8345f5f19435f
SHA-256: 1cdba9ead54500e8e4abfba60325a452195b6b6ed6284bde25b805ec8c8a1480
 
x86_64:
thunderbird-2.0.0.24-13.el5_5.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 3dd11fbaf13f652e8cad1b5d7538c763
SHA-256: 372115d2466d8d8770bbc8b9345d618894548ef96cc5b503d261419edadf0e3c
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
thunderbird-1.5.0.12-34.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5f2dc7be18f9a3586665110a95c7c1a4
SHA-256: 76c23ba2f88dfbfccee0b13c0793a016f15d0b241fb817b44b5578847e09a3a9
 
IA-64:
thunderbird-1.5.0.12-34.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 1553b669d9f6784558bdf54c268fda24
SHA-256: 1d839e6669b2ac2b6d32edd533512c11c51c2bf6db3c842bd514fd3fd97dd89f
 
x86_64:
thunderbird-1.5.0.12-34.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5a675ba842f231382836252d12af7068
SHA-256: ed0afc400be9d3729a035380f7f38a9b2d540e97901050afe7e58c03e47bcf26
 
Red Hat Enterprise Linux ES (v. 4.8.z)

IA-32:
thunderbird-1.5.0.12-34.el4.i386.rpm
File outdated by:  RHSA-2011:0887
    MD5: 5f2dc7be18f9a3586665110a95c7c1a4
SHA-256: 76c23ba2f88dfbfccee0b13c0793a016f15d0b241fb817b44b5578847e09a3a9
 
IA-64:
thunderbird-1.5.0.12-34.el4.ia64.rpm
File outdated by:  RHSA-2011:0887
    MD5: 1553b669d9f6784558bdf54c268fda24
SHA-256: 1d839e6669b2ac2b6d32edd533512c11c51c2bf6db3c842bd514fd3fd97dd89f
 
x86_64:
thunderbird-1.5.0.12-34.el4.x86_64.rpm
File outdated by:  RHSA-2011:0887
    MD5: 5a675ba842f231382836252d12af7068
SHA-256: ed0afc400be9d3729a035380f7f38a9b2d540e97901050afe7e58c03e47bcf26
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
thunderbird-1.5.0.12-34.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5f2dc7be18f9a3586665110a95c7c1a4
SHA-256: 76c23ba2f88dfbfccee0b13c0793a016f15d0b241fb817b44b5578847e09a3a9
 
IA-64:
thunderbird-1.5.0.12-34.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 1553b669d9f6784558bdf54c268fda24
SHA-256: 1d839e6669b2ac2b6d32edd533512c11c51c2bf6db3c842bd514fd3fd97dd89f
 
x86_64:
thunderbird-1.5.0.12-34.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 5a675ba842f231382836252d12af7068
SHA-256: ed0afc400be9d3729a035380f7f38a9b2d540e97901050afe7e58c03e47bcf26
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

660408 - CVE-2010-3776 Mozilla miscellaneous memory safety hazards (MFSA 2010-74)
660419 - CVE-2010-3772 Mozilla crash and remote code execution using HTML tags inside a XUL tree (MFSA 2010-77)
660431 - CVE-2010-3767 Mozilla integer overflow vulnerability in NewIdArray (MFSA 2010-81)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/