Skip to navigation

Security Advisory Critical: thunderbird security update

Advisory: RHSA-2011:0475-1
Type: Security Advisory
Severity: Critical
Issued on: 2011-04-28
Last updated on: 2011-04-28
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.0.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-0070
CVE-2011-0071
CVE-2011-0073
CVE-2011-0074
CVE-2011-0075
CVE-2011-0077
CVE-2011-0078
CVE-2011-0080
CVE-2011-0081

Details

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed HTML content. An
HTML mail message containing malicious content could possibly lead to
arbitrary code execution with the privileges of the user running
Thunderbird. (CVE-2011-0080, CVE-2011-0081)

An arbitrary memory write flaw was found in the way Thunderbird handled
out-of-memory conditions. If all memory was consumed when a user viewed a
malicious HTML mail message, it could possibly lead to arbitrary code
execution with the privileges of the user running Thunderbird.
(CVE-2011-0078)

An integer overflow flaw was found in the way Thunderbird handled the HTML
frameset tag. An HTML mail message with a frameset tag containing large
values for the "rows" and "cols" attributes could trigger this flaw,
possibly leading to arbitrary code execution with the privileges of the
user running Thunderbird. (CVE-2011-0077)

A flaw was found in the way Thunderbird handled the HTML iframe tag. An
HTML mail message with an iframe tag containing a specially-crafted source
address could trigger this flaw, possibly leading to arbitrary code
execution with the privileges of the user running Thunderbird.
(CVE-2011-0075)

A flaw was found in the way Thunderbird displayed multiple marquee
elements. A malformed HTML mail message could cause Thunderbird to execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2011-0074)

A flaw was found in the way Thunderbird handled the nsTreeSelection
element. Malformed content could cause Thunderbird to execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2011-0073)

A directory traversal flaw was found in the Thunderbird resource://
protocol handler. Malicious content could cause Thunderbird to access
arbitrary files accessible to the user running Thunderbird. (CVE-2011-0071)

A double free flaw was found in the way Thunderbird handled
"application/http-index-format" documents. A malformed HTTP response could
cause Thunderbird to execute arbitrary code with the privileges of the user
running Thunderbird. (CVE-2011-0070)

All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
thunderbird-3.1.10-1.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5e971974190555426a7ee51c095c29fa
SHA-256: 3bc062d3a92aa1af2c39a54c4b4379b01669e3527df09599d50b03fa0437a26a
 
IA-32:
thunderbird-3.1.10-1.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: a4b8165edc4ef9f4efb7e57ff6c8debd
SHA-256: 3b8170de57e905990e88406d6d0561d78f68ef2de2b039703c0dfb4fafaef9b1
thunderbird-debuginfo-3.1.10-1.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: b3e614ce0e30b5486bec197df59b8ac2
SHA-256: f98188a49093890d56336bde4dda4fbc1874abccf4420d316f6564bc20e73930
 
x86_64:
thunderbird-3.1.10-1.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 95b0c8ce62acac63e8266253dcbc1dad
SHA-256: bd259aef4a9fa72e27149ad52600ab219ec8c2f3a7ebd627796e768f89da134e
thunderbird-debuginfo-3.1.10-1.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: c74e05b5394595b33ceafd803d457914
SHA-256: 63c55b41c4852567e3d0b8563f73d7c6374390ab513812107a9ea3a1dc3dbdc1
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
thunderbird-3.1.10-1.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5e971974190555426a7ee51c095c29fa
SHA-256: 3bc062d3a92aa1af2c39a54c4b4379b01669e3527df09599d50b03fa0437a26a
 
IA-32:
thunderbird-3.1.10-1.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: a4b8165edc4ef9f4efb7e57ff6c8debd
SHA-256: 3b8170de57e905990e88406d6d0561d78f68ef2de2b039703c0dfb4fafaef9b1
thunderbird-debuginfo-3.1.10-1.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: b3e614ce0e30b5486bec197df59b8ac2
SHA-256: f98188a49093890d56336bde4dda4fbc1874abccf4420d316f6564bc20e73930
 
PPC:
thunderbird-3.1.10-1.el6_0.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 3c4e4c80ac8b94fa5294127d9a926f26
SHA-256: 865e01ef951dfd3cb7070eec222ee4e7169eef178abe65c1f243d84834350d1c
thunderbird-debuginfo-3.1.10-1.el6_0.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 116143227f3dcc72dbad8bb1fdaa758f
SHA-256: f7124f3742c3c74038b3eee67ba184ffbaa99d1cad9be0bf5a1e5caebfd9b610
 
s390x:
thunderbird-3.1.10-1.el6_0.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: 245a642076bb079b6a4606ad45ee4a04
SHA-256: 406b6cf5c90d49f92d6991d043009b750b5fcf9efff3814fcadd88a2c3bb3272
thunderbird-debuginfo-3.1.10-1.el6_0.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: e57270c7327a4a88cdfc2e79d338c3bc
SHA-256: 7621efa3f89ee14a8dc607f131251ae93adc74e6dad45b1b5e159ee3f89f89bd
 
x86_64:
thunderbird-3.1.10-1.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 95b0c8ce62acac63e8266253dcbc1dad
SHA-256: bd259aef4a9fa72e27149ad52600ab219ec8c2f3a7ebd627796e768f89da134e
thunderbird-debuginfo-3.1.10-1.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: c74e05b5394595b33ceafd803d457914
SHA-256: 63c55b41c4852567e3d0b8563f73d7c6374390ab513812107a9ea3a1dc3dbdc1
 
Red Hat Enterprise Linux Server EUS (v. 6.0.z)

SRPMS:
thunderbird-3.1.10-1.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5e971974190555426a7ee51c095c29fa
SHA-256: 3bc062d3a92aa1af2c39a54c4b4379b01669e3527df09599d50b03fa0437a26a
 
IA-32:
thunderbird-3.1.10-1.el6_0.i686.rpm     MD5: a4b8165edc4ef9f4efb7e57ff6c8debd
SHA-256: 3b8170de57e905990e88406d6d0561d78f68ef2de2b039703c0dfb4fafaef9b1
thunderbird-debuginfo-3.1.10-1.el6_0.i686.rpm     MD5: b3e614ce0e30b5486bec197df59b8ac2
SHA-256: f98188a49093890d56336bde4dda4fbc1874abccf4420d316f6564bc20e73930
 
PPC:
thunderbird-3.1.10-1.el6_0.ppc64.rpm     MD5: 3c4e4c80ac8b94fa5294127d9a926f26
SHA-256: 865e01ef951dfd3cb7070eec222ee4e7169eef178abe65c1f243d84834350d1c
thunderbird-debuginfo-3.1.10-1.el6_0.ppc64.rpm     MD5: 116143227f3dcc72dbad8bb1fdaa758f
SHA-256: f7124f3742c3c74038b3eee67ba184ffbaa99d1cad9be0bf5a1e5caebfd9b610
 
s390x:
thunderbird-3.1.10-1.el6_0.s390x.rpm     MD5: 245a642076bb079b6a4606ad45ee4a04
SHA-256: 406b6cf5c90d49f92d6991d043009b750b5fcf9efff3814fcadd88a2c3bb3272
thunderbird-debuginfo-3.1.10-1.el6_0.s390x.rpm     MD5: e57270c7327a4a88cdfc2e79d338c3bc
SHA-256: 7621efa3f89ee14a8dc607f131251ae93adc74e6dad45b1b5e159ee3f89f89bd
 
x86_64:
thunderbird-3.1.10-1.el6_0.x86_64.rpm     MD5: 95b0c8ce62acac63e8266253dcbc1dad
SHA-256: bd259aef4a9fa72e27149ad52600ab219ec8c2f3a7ebd627796e768f89da134e
thunderbird-debuginfo-3.1.10-1.el6_0.x86_64.rpm     MD5: c74e05b5394595b33ceafd803d457914
SHA-256: 63c55b41c4852567e3d0b8563f73d7c6374390ab513812107a9ea3a1dc3dbdc1
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
thunderbird-3.1.10-1.el6_0.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5e971974190555426a7ee51c095c29fa
SHA-256: 3bc062d3a92aa1af2c39a54c4b4379b01669e3527df09599d50b03fa0437a26a
 
IA-32:
thunderbird-3.1.10-1.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: a4b8165edc4ef9f4efb7e57ff6c8debd
SHA-256: 3b8170de57e905990e88406d6d0561d78f68ef2de2b039703c0dfb4fafaef9b1
thunderbird-debuginfo-3.1.10-1.el6_0.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: b3e614ce0e30b5486bec197df59b8ac2
SHA-256: f98188a49093890d56336bde4dda4fbc1874abccf4420d316f6564bc20e73930
 
x86_64:
thunderbird-3.1.10-1.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 95b0c8ce62acac63e8266253dcbc1dad
SHA-256: bd259aef4a9fa72e27149ad52600ab219ec8c2f3a7ebd627796e768f89da134e
thunderbird-debuginfo-3.1.10-1.el6_0.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: c74e05b5394595b33ceafd803d457914
SHA-256: 63c55b41c4852567e3d0b8563f73d7c6374390ab513812107a9ea3a1dc3dbdc1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

700603 - CVE-2011-0078 Mozilla OOM condition arbitrary memory write (MFSA 2011-12)
700613 - CVE-2011-0077 Mozilla integer overflow in frameset spec (MFSA 2011-12)
700615 - CVE-2011-0075 Mozilla crash from bad iframe source (MFSA 2011-12)
700617 - CVE-2011-0074 Mozilla crash from several marquee elements (MFSA 2011-12)
700619 - CVE-2011-0073 Mozilla dangling pointer flaw (MFSA 2011-13)
700635 - CVE-2011-0071 Mozilla directory traversal via resource protocol (MFSA 2011-16)
700640 - CVE-2011-0070 Mozilla double free flaw (MFSA 2011-12)
700676 - CVE-2011-0081 Mozilla memory safety issue (MFSA 2011-12)
700677 - CVE-2011-0080 Mozilla memory safety issue (MFSA 2011-12)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/