Skip to navigation

Security Advisory Critical: thunderbird security update

Advisory: RHSA-2012:1351-1
Type: Security Advisory
Severity: Critical
Issued on: 2012-10-09
Last updated on: 2012-10-09
Affected Products: RHEL Optional Productivity Applications (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2012-1956
CVE-2012-3982
CVE-2012-3986
CVE-2012-3988
CVE-2012-3990
CVE-2012-3991
CVE-2012-3992
CVE-2012-3993
CVE-2012-3994
CVE-2012-3995
CVE-2012-4179
CVE-2012-4180
CVE-2012-4181
CVE-2012-4182
CVE-2012-4183
CVE-2012-4184
CVE-2012-4185
CVE-2012-4186
CVE-2012-4187
CVE-2012-4188

Details

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2012-3982,
CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,
CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,
CVE-2012-4187, CVE-2012-4188)

Two flaws in Thunderbird could allow malicious content to bypass intended
restrictions, possibly leading to information disclosure, or Thunderbird
executing arbitrary code. Note that the information disclosure issue could
possibly be combined with other flaws to achieve arbitrary code execution.
(CVE-2012-3986, CVE-2012-3991)

Multiple flaws were found in the location object implementation in
Thunderbird. Malicious content could be used to perform cross-site
scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,
CVE-2012-3992, CVE-2012-3994)

Two flaws were found in the way Chrome Object Wrappers were implemented.
Malicious content could be used to perform cross-site scripting attacks or
cause Thunderbird to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,
miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,
moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these
issues.

Note: None of the issues in this advisory can be exploited by a
specially-crafted HTML mail message as JavaScript is disabled by default
for mail messages. They could be exploited another way in Thunderbird, for
example, when viewing the full remote content of an RSS feed.

All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 10.0.8 ESR, which corrects these issues. After
installing the update, Thunderbird must be restarted for the changes to
take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
thunderbird-10.0.8-1.el5_8.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: f63a92b80a8b820f06adc777615f15cf
SHA-256: f4d01e09c1940ced2d3bc2bd15e463d96a89a53f5b2c72d806c595877c4b0547
 
IA-32:
thunderbird-10.0.8-1.el5_8.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 0f133e889c6e7d3b4edad07170ac7007
SHA-256: 2ea342b69082919975f9f7070444df6770ad5eb52a8c6a7c6defaba0cbb4feeb
thunderbird-debuginfo-10.0.8-1.el5_8.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 802d8c6cc0630b8931b472c8f0ea7704
SHA-256: d9c1be21b0c9aff29cdcaf3f9527a99138ec3c2740a1c7cb9043ad8748b4325d
 
x86_64:
thunderbird-10.0.8-1.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: b1f9cfe757ca375063564b000171d730
SHA-256: b36eed0e109b45b02ea71737079ddf0359c0490bf8850d3292f34bf8f6274798
thunderbird-debuginfo-10.0.8-1.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2c39c5b695a1d3f18c09991228b4fc36
SHA-256: 252a4c3e65ba94e9d392fe411e09ca917a96900a2d2130e6082262a90f656126
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
thunderbird-10.0.8-1.el5_8.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: f63a92b80a8b820f06adc777615f15cf
SHA-256: f4d01e09c1940ced2d3bc2bd15e463d96a89a53f5b2c72d806c595877c4b0547
 
IA-32:
thunderbird-10.0.8-1.el5_8.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 0f133e889c6e7d3b4edad07170ac7007
SHA-256: 2ea342b69082919975f9f7070444df6770ad5eb52a8c6a7c6defaba0cbb4feeb
thunderbird-debuginfo-10.0.8-1.el5_8.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 802d8c6cc0630b8931b472c8f0ea7704
SHA-256: d9c1be21b0c9aff29cdcaf3f9527a99138ec3c2740a1c7cb9043ad8748b4325d
 
x86_64:
thunderbird-10.0.8-1.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: b1f9cfe757ca375063564b000171d730
SHA-256: b36eed0e109b45b02ea71737079ddf0359c0490bf8850d3292f34bf8f6274798
thunderbird-debuginfo-10.0.8-1.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2c39c5b695a1d3f18c09991228b4fc36
SHA-256: 252a4c3e65ba94e9d392fe411e09ca917a96900a2d2130e6082262a90f656126
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
thunderbird-10.0.8-1.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: f878d7f28a2e58dce7207c460ac3f232
SHA-256: ca0598f6ddef2e336ecdd56d3fd7f973ef646f99bfb6748d5ecea6bdff7eca98
 
IA-32:
thunderbird-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: e580704ca4a76fd9f12134ee220b4835
SHA-256: 58f98a512aaec1fcb2228daa531c40cebcce1a7b296452557df118ef3116518c
thunderbird-debuginfo-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2b70638cb39bb0d97026cdc4107aed86
SHA-256: 2425322db9e95c607f141fc3dc10f36685ea83c991d84b40098408a991f1b0c2
 
x86_64:
thunderbird-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 1b74e04fe03ac380e3165c1f8be33f60
SHA-256: 1cafd3314aad2ac6589fd5ad8f949cfcc8135ad38481ad032b30e36fb465acab
thunderbird-debuginfo-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 573e130818fdd54748ac370ce6c83ca9
SHA-256: dc51bb81b184223cf66d1addc9a1271e726692aff0206822f1fd370604e9d7e4
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
thunderbird-10.0.8-1.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: f878d7f28a2e58dce7207c460ac3f232
SHA-256: ca0598f6ddef2e336ecdd56d3fd7f973ef646f99bfb6748d5ecea6bdff7eca98
 
IA-32:
thunderbird-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: e580704ca4a76fd9f12134ee220b4835
SHA-256: 58f98a512aaec1fcb2228daa531c40cebcce1a7b296452557df118ef3116518c
thunderbird-debuginfo-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2b70638cb39bb0d97026cdc4107aed86
SHA-256: 2425322db9e95c607f141fc3dc10f36685ea83c991d84b40098408a991f1b0c2
 
PPC:
thunderbird-10.0.8-1.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 7bde5bf7ede4c708a803187379a79262
SHA-256: b11f36e016123c9f5f9311b1dd8bd2aa2b2cb608664f30641022cf04f291cddd
thunderbird-debuginfo-10.0.8-1.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: d5fbf4b6a66b30a3afd7e83c74fca665
SHA-256: 6570d197899291c30f7c2817d5fc8e7b7a86bb0dd6071a4b770a09ead672e9b6
 
s390x:
thunderbird-10.0.8-1.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5b4275f04591a7b0ab0f0ddea91d8afc
SHA-256: 681400563137025666908760d523f01e802172f0f8838c4417396f183b263bfa
thunderbird-debuginfo-10.0.8-1.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: 05a6fdb225f91a63d151d9f8bed6b9fd
SHA-256: d017abcce9e9929e0f634c692bf814799f52db4ea4c2b990b89cc5121b68efc8
 
x86_64:
thunderbird-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 1b74e04fe03ac380e3165c1f8be33f60
SHA-256: 1cafd3314aad2ac6589fd5ad8f949cfcc8135ad38481ad032b30e36fb465acab
thunderbird-debuginfo-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 573e130818fdd54748ac370ce6c83ca9
SHA-256: dc51bb81b184223cf66d1addc9a1271e726692aff0206822f1fd370604e9d7e4
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
thunderbird-10.0.8-1.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: f878d7f28a2e58dce7207c460ac3f232
SHA-256: ca0598f6ddef2e336ecdd56d3fd7f973ef646f99bfb6748d5ecea6bdff7eca98
 
IA-32:
thunderbird-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0272
    MD5: e580704ca4a76fd9f12134ee220b4835
SHA-256: 58f98a512aaec1fcb2228daa531c40cebcce1a7b296452557df118ef3116518c
thunderbird-debuginfo-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0272
    MD5: 2b70638cb39bb0d97026cdc4107aed86
SHA-256: 2425322db9e95c607f141fc3dc10f36685ea83c991d84b40098408a991f1b0c2
 
PPC:
thunderbird-10.0.8-1.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:0272
    MD5: 7bde5bf7ede4c708a803187379a79262
SHA-256: b11f36e016123c9f5f9311b1dd8bd2aa2b2cb608664f30641022cf04f291cddd
thunderbird-debuginfo-10.0.8-1.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:0272
    MD5: d5fbf4b6a66b30a3afd7e83c74fca665
SHA-256: 6570d197899291c30f7c2817d5fc8e7b7a86bb0dd6071a4b770a09ead672e9b6
 
s390x:
thunderbird-10.0.8-1.el6_3.s390x.rpm
File outdated by:  RHSA-2013:0272
    MD5: 5b4275f04591a7b0ab0f0ddea91d8afc
SHA-256: 681400563137025666908760d523f01e802172f0f8838c4417396f183b263bfa
thunderbird-debuginfo-10.0.8-1.el6_3.s390x.rpm
File outdated by:  RHSA-2013:0272
    MD5: 05a6fdb225f91a63d151d9f8bed6b9fd
SHA-256: d017abcce9e9929e0f634c692bf814799f52db4ea4c2b990b89cc5121b68efc8
 
x86_64:
thunderbird-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0272
    MD5: 1b74e04fe03ac380e3165c1f8be33f60
SHA-256: 1cafd3314aad2ac6589fd5ad8f949cfcc8135ad38481ad032b30e36fb465acab
thunderbird-debuginfo-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0272
    MD5: 573e130818fdd54748ac370ce6c83ca9
SHA-256: dc51bb81b184223cf66d1addc9a1271e726692aff0206822f1fd370604e9d7e4
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
thunderbird-10.0.8-1.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: f878d7f28a2e58dce7207c460ac3f232
SHA-256: ca0598f6ddef2e336ecdd56d3fd7f973ef646f99bfb6748d5ecea6bdff7eca98
 
IA-32:
thunderbird-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: e580704ca4a76fd9f12134ee220b4835
SHA-256: 58f98a512aaec1fcb2228daa531c40cebcce1a7b296452557df118ef3116518c
thunderbird-debuginfo-10.0.8-1.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 2b70638cb39bb0d97026cdc4107aed86
SHA-256: 2425322db9e95c607f141fc3dc10f36685ea83c991d84b40098408a991f1b0c2
 
x86_64:
thunderbird-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 1b74e04fe03ac380e3165c1f8be33f60
SHA-256: 1cafd3314aad2ac6589fd5ad8f949cfcc8135ad38481ad032b30e36fb465acab
thunderbird-debuginfo-10.0.8-1.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 573e130818fdd54748ac370ce6c83ca9
SHA-256: dc51bb81b184223cf66d1addc9a1271e726692aff0206822f1fd370604e9d7e4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

851912 - CVE-2012-1956 Mozilla: Location object can be shadowed using Object.defineProperty (MFSA 2012-59)
863614 - CVE-2012-3982 Mozilla: Miscellaneous memory safety hazards (rv:10.0.8) (MFSA 2012-74)
863618 - CVE-2012-3986 Mozilla: Some DOMWindowUtils methods bypass security checks (MFSA 2012-77)
863619 - CVE-2012-3988 Mozilla: DOS and crash with full screen and history navigation (MFSA 2012-79)
863621 - CVE-2012-3991 Mozilla: GetProperty function can bypass security checks (MFSA 2012-81)
863622 - CVE-2012-3994 Mozilla: top object and location property accessible by plugins (MFSA 2012-82)
863623 - CVE-2012-3993 CVE-2012-4184 Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83)
863624 - CVE-2012-3992 Mozilla: Spoofing and script injection through location.hash (MFSA 2012-84)
863625 - CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4181 CVE-2012-4182 CVE-2012-4183 Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85)
863626 - CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
863628 - CVE-2012-3990 Mozilla: Use-after-free in the IME State Manager (MFSA 2012-87)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/