Skip to navigation

Security Advisory Critical: thunderbird security update

Advisory: RHSA-2011:0886-1
Type: Security Advisory
Severity: Critical
Issued on: 2011-06-21
Last updated on: 2011-06-21
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.1.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-0083
CVE-2011-0085
CVE-2011-2362
CVE-2011-2363
CVE-2011-2364
CVE-2011-2365
CVE-2011-2374
CVE-2011-2375
CVE-2011-2376
CVE-2011-2377
CVE-2011-2605

Details

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

A flaw was found in the way Thunderbird handled malformed JPEG images. An
HTML mail message containing a malicious JPEG image could cause Thunderbird
to crash or, potentially, execute arbitrary code with the privileges of the
user running Thunderbird. (CVE-2011-2377)

Multiple dangling pointer flaws were found in Thunderbird. Malicious HTML
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2011-0083,
CVE-2011-0085, CVE-2011-2363)

Several flaws were found in the processing of malformed HTML content.
Malicious HTML content could cause Thunderbird to crash or, potentially,
execute arbitrary code with the privileges of the user running Thunderbird.
(CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376)

It was found that Thunderbird could treat two separate cookies (for web
content) as interchangeable if both were for the same domain name but one
of those domain names had a trailing "." character. This violates the
same-origin policy and could possibly lead to data being leaked to the
wrong domain. (CVE-2011-2362)

All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
thunderbird-3.1.11-2.el6_1.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8f0cac921c8ba40a5a3cb50e3325ca2f
SHA-256: 0bc1823d66028a57b9c3effbfc175f434b71a84132a9aee26a872491070fb0b4
 
IA-32:
thunderbird-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 625c5cfcbd204f9786e53142ecf485d0
SHA-256: 9e98b12801bae60518d25bb1b5e97f929f4ee1526a0fdff4277d21168107bf5d
thunderbird-debuginfo-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 234c0e6cda222dbfd289dafd98ad4918
SHA-256: a9d30b80c3d6c2c2e5dca1de6ba618ce0caf90f495f7a02c39c1aa67b2ab84c3
 
x86_64:
thunderbird-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6d8513ad94e11300e8fa4e9ba422b527
SHA-256: 2a9b13b43c69706049177844810b8fad752af56aa095cebc7ca7acbde64e1497
thunderbird-debuginfo-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 7fa097e2ed6e7d5a9a50887cbc5584b2
SHA-256: 61f3496f53d082c32a9775f475cb9019d02973606b007c334f15b6e4f8dab6e8
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
thunderbird-3.1.11-2.el6_1.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8f0cac921c8ba40a5a3cb50e3325ca2f
SHA-256: 0bc1823d66028a57b9c3effbfc175f434b71a84132a9aee26a872491070fb0b4
 
IA-32:
thunderbird-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 625c5cfcbd204f9786e53142ecf485d0
SHA-256: 9e98b12801bae60518d25bb1b5e97f929f4ee1526a0fdff4277d21168107bf5d
thunderbird-debuginfo-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 234c0e6cda222dbfd289dafd98ad4918
SHA-256: a9d30b80c3d6c2c2e5dca1de6ba618ce0caf90f495f7a02c39c1aa67b2ab84c3
 
PPC:
thunderbird-3.1.11-2.el6_1.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 869863bd9a8cbdf11483c31b8dd22e7a
SHA-256: b004ad422eead7744f852c1ff206126431a56edf7f73e133dd2b5b68eb4110e2
thunderbird-debuginfo-3.1.11-2.el6_1.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4c994d80c979d35c460ca5236b47fab8
SHA-256: 3300a466916dbf5837f14beaca53a504ad4d5dd0770eb2092d6536fddc5f6668
 
s390x:
thunderbird-3.1.11-2.el6_1.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: 33cc476e6813c0466331ebe9c0c8a22a
SHA-256: 81a0ed8477b9a503b8ecdf7bcb41d0d937bbc1743c19cfbd3c524414de523672
thunderbird-debuginfo-3.1.11-2.el6_1.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: cd06edb17058c71660b01a54bacae1a2
SHA-256: 7a45de026ebbb3aa9556caf9bc08ada1b41d19bce3fee8e8f71160034a13ecc3
 
x86_64:
thunderbird-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6d8513ad94e11300e8fa4e9ba422b527
SHA-256: 2a9b13b43c69706049177844810b8fad752af56aa095cebc7ca7acbde64e1497
thunderbird-debuginfo-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 7fa097e2ed6e7d5a9a50887cbc5584b2
SHA-256: 61f3496f53d082c32a9775f475cb9019d02973606b007c334f15b6e4f8dab6e8
 
Red Hat Enterprise Linux Server EUS (v. 6.1.z)

SRPMS:
thunderbird-3.1.11-2.el6_1.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8f0cac921c8ba40a5a3cb50e3325ca2f
SHA-256: 0bc1823d66028a57b9c3effbfc175f434b71a84132a9aee26a872491070fb0b4
 
IA-32:
thunderbird-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2011:1439
    MD5: 625c5cfcbd204f9786e53142ecf485d0
SHA-256: 9e98b12801bae60518d25bb1b5e97f929f4ee1526a0fdff4277d21168107bf5d
thunderbird-debuginfo-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2011:1439
    MD5: 234c0e6cda222dbfd289dafd98ad4918
SHA-256: a9d30b80c3d6c2c2e5dca1de6ba618ce0caf90f495f7a02c39c1aa67b2ab84c3
 
PPC:
thunderbird-3.1.11-2.el6_1.ppc64.rpm
File outdated by:  RHSA-2011:1439
    MD5: 869863bd9a8cbdf11483c31b8dd22e7a
SHA-256: b004ad422eead7744f852c1ff206126431a56edf7f73e133dd2b5b68eb4110e2
thunderbird-debuginfo-3.1.11-2.el6_1.ppc64.rpm
File outdated by:  RHSA-2011:1439
    MD5: 4c994d80c979d35c460ca5236b47fab8
SHA-256: 3300a466916dbf5837f14beaca53a504ad4d5dd0770eb2092d6536fddc5f6668
 
s390x:
thunderbird-3.1.11-2.el6_1.s390x.rpm
File outdated by:  RHSA-2011:1439
    MD5: 33cc476e6813c0466331ebe9c0c8a22a
SHA-256: 81a0ed8477b9a503b8ecdf7bcb41d0d937bbc1743c19cfbd3c524414de523672
thunderbird-debuginfo-3.1.11-2.el6_1.s390x.rpm
File outdated by:  RHSA-2011:1439
    MD5: cd06edb17058c71660b01a54bacae1a2
SHA-256: 7a45de026ebbb3aa9556caf9bc08ada1b41d19bce3fee8e8f71160034a13ecc3
 
x86_64:
thunderbird-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2011:1439
    MD5: 6d8513ad94e11300e8fa4e9ba422b527
SHA-256: 2a9b13b43c69706049177844810b8fad752af56aa095cebc7ca7acbde64e1497
thunderbird-debuginfo-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2011:1439
    MD5: 7fa097e2ed6e7d5a9a50887cbc5584b2
SHA-256: 61f3496f53d082c32a9775f475cb9019d02973606b007c334f15b6e4f8dab6e8
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
thunderbird-3.1.11-2.el6_1.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8f0cac921c8ba40a5a3cb50e3325ca2f
SHA-256: 0bc1823d66028a57b9c3effbfc175f434b71a84132a9aee26a872491070fb0b4
 
IA-32:
thunderbird-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 625c5cfcbd204f9786e53142ecf485d0
SHA-256: 9e98b12801bae60518d25bb1b5e97f929f4ee1526a0fdff4277d21168107bf5d
thunderbird-debuginfo-3.1.11-2.el6_1.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 234c0e6cda222dbfd289dafd98ad4918
SHA-256: a9d30b80c3d6c2c2e5dca1de6ba618ce0caf90f495f7a02c39c1aa67b2ab84c3
 
x86_64:
thunderbird-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 6d8513ad94e11300e8fa4e9ba422b527
SHA-256: 2a9b13b43c69706049177844810b8fad752af56aa095cebc7ca7acbde64e1497
thunderbird-debuginfo-3.1.11-2.el6_1.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 7fa097e2ed6e7d5a9a50887cbc5584b2
SHA-256: 61f3496f53d082c32a9775f475cb9019d02973606b007c334f15b6e4f8dab6e8
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

714576 - CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376 Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)
714581 - CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)
714583 - CVE-2011-2362 Mozilla Cookie isolation error (MFSA 2011-24)
714929 - CVE-2011-2377 Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/