Skip to navigation

Security Advisory Critical: thunderbird security update

Advisory: RHSA-2011:0474-1
Type: Security Advisory
Severity: Critical
Issued on: 2011-04-28
Last updated on: 2011-04-28
Affected Products: RHEL Optional Productivity Applications (v. 5 server)
RHEL Optional Productivity Applications EUS (v. 5.6.z server)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2011-0073
CVE-2011-0074
CVE-2011-0075
CVE-2011-0077
CVE-2011-0078
CVE-2011-0080

Details

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed HTML content. An
HTML mail message containing malicious content could possibly lead to
arbitrary code execution with the privileges of the user running
Thunderbird. (CVE-2011-0080)

An arbitrary memory write flaw was found in the way Thunderbird handled
out-of-memory conditions. If all memory was consumed when a user viewed a
malicious HTML mail message, it could possibly lead to arbitrary code
execution with the privileges of the user running Thunderbird.
(CVE-2011-0078)

An integer overflow flaw was found in the way Thunderbird handled the HTML
frameset tag. An HTML mail message with a frameset tag containing large
values for the "rows" and "cols" attributes could trigger this flaw,
possibly leading to arbitrary code execution with the privileges of the
user running Thunderbird. (CVE-2011-0077)

A flaw was found in the way Thunderbird handled the HTML iframe tag. An
HTML mail message with an iframe tag containing a specially-crafted source
address could trigger this flaw, possibly leading to arbitrary code
execution with the privileges of the user running Thunderbird.
(CVE-2011-0075)

A flaw was found in the way Thunderbird displayed multiple marquee
elements. A malformed HTML mail message could cause Thunderbird to execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2011-0074)

A flaw was found in the way Thunderbird handled the nsTreeSelection
element. Malformed content could cause Thunderbird to execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2011-0073)

All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
thunderbird-2.0.0.24-17.el5_6.src.rpm
File outdated by:  RHSA-2011:0887
    MD5: 4ca1f843a9d4008048c95003b15c0313
SHA-256: f4699a38acf916c0503bcc3f4d492b822f4e391d643700f174da3d66d4df47b6
 
IA-32:
thunderbird-2.0.0.24-17.el5_6.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5a23d3cfdb8d03ea98873fccebe86c92
SHA-256: 236446c27eacce8e88d6234f6397c722765b1fc066479fa2204cd6bd7dea17c7
 
x86_64:
thunderbird-2.0.0.24-17.el5_6.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6bf17c5db883f0e7455e110028138964
SHA-256: 9e12d24a38eefcc3da8b79e2ecb4157cff982eee8994d9a368f5f10a0639e500
 
RHEL Optional Productivity Applications EUS (v. 5.6.z server)

SRPMS:
thunderbird-2.0.0.24-17.el5_6.src.rpm
File outdated by:  RHSA-2011:0887
    MD5: 4ca1f843a9d4008048c95003b15c0313
SHA-256: f4699a38acf916c0503bcc3f4d492b822f4e391d643700f174da3d66d4df47b6
 
IA-32:
thunderbird-2.0.0.24-17.el5_6.i386.rpm
File outdated by:  RHSA-2011:0887
    MD5: 5a23d3cfdb8d03ea98873fccebe86c92
SHA-256: 236446c27eacce8e88d6234f6397c722765b1fc066479fa2204cd6bd7dea17c7
 
x86_64:
thunderbird-2.0.0.24-17.el5_6.x86_64.rpm
File outdated by:  RHSA-2011:0887
    MD5: 6bf17c5db883f0e7455e110028138964
SHA-256: 9e12d24a38eefcc3da8b79e2ecb4157cff982eee8994d9a368f5f10a0639e500
 
Red Hat Desktop (v. 4)

SRPMS:
thunderbird-1.5.0.12-38.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 67872a88dc6293ea459773cb186f9412
SHA-256: 35b8108b174c5e762d72eec5683a64bbb6074ff204ce3ac649ffea6ccbe02dc7
 
IA-32:
thunderbird-1.5.0.12-38.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 90d9919cc774a2cb1e7a8bfee6e65435
SHA-256: 4e8543c67baf8c4f34b97c3d4a6d2f3c5fc4d8a7af5b8cc09d27f21d6acb0461
 
x86_64:
thunderbird-1.5.0.12-38.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 1e7f764cb182221583a75f95bf573431
SHA-256: 9ca0cef3e5afe7d3113d38fa5ad57f975fe3dc41da811a9785ce54221d04f03b
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
thunderbird-1.5.0.12-38.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 67872a88dc6293ea459773cb186f9412
SHA-256: 35b8108b174c5e762d72eec5683a64bbb6074ff204ce3ac649ffea6ccbe02dc7
 
IA-32:
thunderbird-1.5.0.12-38.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 90d9919cc774a2cb1e7a8bfee6e65435
SHA-256: 4e8543c67baf8c4f34b97c3d4a6d2f3c5fc4d8a7af5b8cc09d27f21d6acb0461
 
IA-64:
thunderbird-1.5.0.12-38.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: abfca5ea89950f760edb61d8e03f93c2
SHA-256: d62e2c175c0a3606f1fd1d79e8cdbc7148bc0e9d17abc71000c25001d85a291c
 
PPC:
thunderbird-1.5.0.12-38.el4.ppc.rpm
File outdated by:  RHSA-2012:0085
    MD5: 922f6941cd90a3df466533e8f1c6eb72
SHA-256: 1d56905e4bb07376415bb60f8d9e5c49ea9b3b4e59dc5f9c2aaa503cfb8d1da6
 
s390:
thunderbird-1.5.0.12-38.el4.s390.rpm
File outdated by:  RHSA-2012:0085
    MD5: 9999cebbe8f60acdc160118942df6e96
SHA-256: f522013d91f1acf9aa1781e2350d992c4e5bc64191fbe89853f9d09b892ad552
 
s390x:
thunderbird-1.5.0.12-38.el4.s390x.rpm
File outdated by:  RHSA-2012:0085
    MD5: 6a5f158a8b3351dae457421563dfc9af
SHA-256: cdce82ef604233b7bc2da6d484942cd348752e414dc69f4b08d3bfa07fa5fdaf
 
x86_64:
thunderbird-1.5.0.12-38.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 1e7f764cb182221583a75f95bf573431
SHA-256: 9ca0cef3e5afe7d3113d38fa5ad57f975fe3dc41da811a9785ce54221d04f03b
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
thunderbird-1.5.0.12-38.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 67872a88dc6293ea459773cb186f9412
SHA-256: 35b8108b174c5e762d72eec5683a64bbb6074ff204ce3ac649ffea6ccbe02dc7
 
IA-32:
thunderbird-1.5.0.12-38.el4.i386.rpm
File outdated by:  RHSA-2011:0887
    MD5: 90d9919cc774a2cb1e7a8bfee6e65435
SHA-256: 4e8543c67baf8c4f34b97c3d4a6d2f3c5fc4d8a7af5b8cc09d27f21d6acb0461
 
IA-64:
thunderbird-1.5.0.12-38.el4.ia64.rpm
File outdated by:  RHSA-2011:0887
    MD5: abfca5ea89950f760edb61d8e03f93c2
SHA-256: d62e2c175c0a3606f1fd1d79e8cdbc7148bc0e9d17abc71000c25001d85a291c
 
PPC:
thunderbird-1.5.0.12-38.el4.ppc.rpm
File outdated by:  RHSA-2011:0887
    MD5: 922f6941cd90a3df466533e8f1c6eb72
SHA-256: 1d56905e4bb07376415bb60f8d9e5c49ea9b3b4e59dc5f9c2aaa503cfb8d1da6
 
s390:
thunderbird-1.5.0.12-38.el4.s390.rpm
File outdated by:  RHSA-2011:0887
    MD5: 9999cebbe8f60acdc160118942df6e96
SHA-256: f522013d91f1acf9aa1781e2350d992c4e5bc64191fbe89853f9d09b892ad552
 
s390x:
thunderbird-1.5.0.12-38.el4.s390x.rpm
File outdated by:  RHSA-2011:0887
    MD5: 6a5f158a8b3351dae457421563dfc9af
SHA-256: cdce82ef604233b7bc2da6d484942cd348752e414dc69f4b08d3bfa07fa5fdaf
 
x86_64:
thunderbird-1.5.0.12-38.el4.x86_64.rpm
File outdated by:  RHSA-2011:0887
    MD5: 1e7f764cb182221583a75f95bf573431
SHA-256: 9ca0cef3e5afe7d3113d38fa5ad57f975fe3dc41da811a9785ce54221d04f03b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
thunderbird-2.0.0.24-17.el5_6.src.rpm
File outdated by:  RHSA-2011:0887
    MD5: 4ca1f843a9d4008048c95003b15c0313
SHA-256: f4699a38acf916c0503bcc3f4d492b822f4e391d643700f174da3d66d4df47b6
 
IA-32:
thunderbird-2.0.0.24-17.el5_6.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5a23d3cfdb8d03ea98873fccebe86c92
SHA-256: 236446c27eacce8e88d6234f6397c722765b1fc066479fa2204cd6bd7dea17c7
 
x86_64:
thunderbird-2.0.0.24-17.el5_6.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6bf17c5db883f0e7455e110028138964
SHA-256: 9e12d24a38eefcc3da8b79e2ecb4157cff982eee8994d9a368f5f10a0639e500
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
thunderbird-1.5.0.12-38.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 67872a88dc6293ea459773cb186f9412
SHA-256: 35b8108b174c5e762d72eec5683a64bbb6074ff204ce3ac649ffea6ccbe02dc7
 
IA-32:
thunderbird-1.5.0.12-38.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 90d9919cc774a2cb1e7a8bfee6e65435
SHA-256: 4e8543c67baf8c4f34b97c3d4a6d2f3c5fc4d8a7af5b8cc09d27f21d6acb0461
 
IA-64:
thunderbird-1.5.0.12-38.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: abfca5ea89950f760edb61d8e03f93c2
SHA-256: d62e2c175c0a3606f1fd1d79e8cdbc7148bc0e9d17abc71000c25001d85a291c
 
x86_64:
thunderbird-1.5.0.12-38.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 1e7f764cb182221583a75f95bf573431
SHA-256: 9ca0cef3e5afe7d3113d38fa5ad57f975fe3dc41da811a9785ce54221d04f03b
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
thunderbird-1.5.0.12-38.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 67872a88dc6293ea459773cb186f9412
SHA-256: 35b8108b174c5e762d72eec5683a64bbb6074ff204ce3ac649ffea6ccbe02dc7
 
IA-32:
thunderbird-1.5.0.12-38.el4.i386.rpm
File outdated by:  RHSA-2011:0887
    MD5: 90d9919cc774a2cb1e7a8bfee6e65435
SHA-256: 4e8543c67baf8c4f34b97c3d4a6d2f3c5fc4d8a7af5b8cc09d27f21d6acb0461
 
IA-64:
thunderbird-1.5.0.12-38.el4.ia64.rpm
File outdated by:  RHSA-2011:0887
    MD5: abfca5ea89950f760edb61d8e03f93c2
SHA-256: d62e2c175c0a3606f1fd1d79e8cdbc7148bc0e9d17abc71000c25001d85a291c
 
x86_64:
thunderbird-1.5.0.12-38.el4.x86_64.rpm
File outdated by:  RHSA-2011:0887
    MD5: 1e7f764cb182221583a75f95bf573431
SHA-256: 9ca0cef3e5afe7d3113d38fa5ad57f975fe3dc41da811a9785ce54221d04f03b
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
thunderbird-1.5.0.12-38.el4.src.rpm
File outdated by:  RHSA-2012:0085
    MD5: 67872a88dc6293ea459773cb186f9412
SHA-256: 35b8108b174c5e762d72eec5683a64bbb6074ff204ce3ac649ffea6ccbe02dc7
 
IA-32:
thunderbird-1.5.0.12-38.el4.i386.rpm
File outdated by:  RHSA-2012:0085
    MD5: 90d9919cc774a2cb1e7a8bfee6e65435
SHA-256: 4e8543c67baf8c4f34b97c3d4a6d2f3c5fc4d8a7af5b8cc09d27f21d6acb0461
 
IA-64:
thunderbird-1.5.0.12-38.el4.ia64.rpm
File outdated by:  RHSA-2012:0085
    MD5: abfca5ea89950f760edb61d8e03f93c2
SHA-256: d62e2c175c0a3606f1fd1d79e8cdbc7148bc0e9d17abc71000c25001d85a291c
 
x86_64:
thunderbird-1.5.0.12-38.el4.x86_64.rpm
File outdated by:  RHSA-2012:0085
    MD5: 1e7f764cb182221583a75f95bf573431
SHA-256: 9ca0cef3e5afe7d3113d38fa5ad57f975fe3dc41da811a9785ce54221d04f03b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

700603 - CVE-2011-0078 Mozilla OOM condition arbitrary memory write (MFSA 2011-12)
700613 - CVE-2011-0077 Mozilla integer overflow in frameset spec (MFSA 2011-12)
700615 - CVE-2011-0075 Mozilla crash from bad iframe source (MFSA 2011-12)
700617 - CVE-2011-0074 Mozilla crash from several marquee elements (MFSA 2011-12)
700619 - CVE-2011-0073 Mozilla dangling pointer flaw (MFSA 2011-13)
700677 - CVE-2011-0080 Mozilla memory safety issue (MFSA 2011-12)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/