Skip to navigation

Security Advisory Critical: thunderbird security update

Advisory: RHSA-2013:0145-1
Type: Security Advisory
Severity: Critical
Issued on: 2013-01-08
Last updated on: 2013-01-08
Affected Products: RHEL Optional Productivity Applications (v. 5 server)
RHEL Optional Productivity Applications EUS (v. 5.9.z server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-0744
CVE-2013-0746
CVE-2013-0748
CVE-2013-0750
CVE-2013-0753
CVE-2013-0754
CVE-2013-0758
CVE-2013-0759
CVE-2013-0762
CVE-2013-0766
CVE-2013-0767
CVE-2013-0769

Details

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2013-0744,
CVE-2013-0746, CVE-2013-0750, CVE-2013-0753, CVE-2013-0754, CVE-2013-0762,
CVE-2013-0766, CVE-2013-0767, CVE-2013-0769)

A flaw was found in the way Chrome Object Wrappers were implemented.
Malicious content could be used to cause Thunderbird to execute arbitrary
code via plug-ins installed in Thunderbird. (CVE-2013-0758)

A flaw in the way Thunderbird displayed URL values could allow malicious
content or a user to perform a phishing attack. (CVE-2013-0759)

An information disclosure flaw was found in the way certain JavaScript
functions were implemented in Thunderbird. An attacker could use this flaw
to bypass Address Space Layout Randomization (ASLR) and other security
restrictions. (CVE-2013-0748)

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Atte Kettunen, Boris Zbarsky, pa_kt, regenrecht,
Abhishek Arya, Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki
Ishikawa, Mariusz Mlynski, Masato Kinugawa, and Jesse Ruderman as the
original reporters of these issues.

Note: All issues except CVE-2013-0744, CVE-2013-0753, and CVE-2013-0754
cannot be exploited by a specially-crafted HTML mail message as JavaScript
is disabled by default for mail messages. They could be exploited another
way in Thunderbird, for example, when viewing the full remote content of an
RSS feed.

All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 10.0.12 ESR, which corrects these issues.
After installing the update, Thunderbird must be restarted for the changes
to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
thunderbird-10.0.12-3.el5_9.src.rpm
File outdated by:  RHSA-2013:1269
    MD5: 6cdd7946ba667d823b5e4768edb7b5f9
SHA-256: 26d2035f4ad97ef19e35d6eb65b3a40d1d6aa45ddcf25736e3d706ed02cb9e60
 
IA-32:
thunderbird-10.0.12-3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8f565aeecb8beb532b76008cb56d0aa8
SHA-256: 674cda4a8891722366f4b759280c0adbe3b945dd05cd1489a8a5339a90859ba8
thunderbird-debuginfo-10.0.12-3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4c042b8fd34553300f6ee0da238f08f7
SHA-256: 8a6bb9e5d73880c1f71ac2a869b57b975a6af483caed795d7d203823e405cbcf
 
x86_64:
thunderbird-10.0.12-3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 813b5ae6828f2973e7ccad035e64e4e5
SHA-256: b795fa0f0c82fdf07772b4ed99e03c917f10a9d90f9bf1030a7966db2a7eaae7
thunderbird-debuginfo-10.0.12-3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: d51008054a5f866992053a6170ac9890
SHA-256: fef7dc75012f21dbc04ed81a054e4b1be9de3609fe8bdb71d365fe221cf3d143
 
RHEL Optional Productivity Applications EUS (v. 5.9.z server)

SRPMS:
thunderbird-10.0.12-3.el5_9.src.rpm
File outdated by:  RHSA-2013:1269
    MD5: 6cdd7946ba667d823b5e4768edb7b5f9
SHA-256: 26d2035f4ad97ef19e35d6eb65b3a40d1d6aa45ddcf25736e3d706ed02cb9e60
 
IA-32:
thunderbird-10.0.12-3.el5_9.i386.rpm
File outdated by:  RHSA-2013:1269
    MD5: 8f565aeecb8beb532b76008cb56d0aa8
SHA-256: 674cda4a8891722366f4b759280c0adbe3b945dd05cd1489a8a5339a90859ba8
thunderbird-debuginfo-10.0.12-3.el5_9.i386.rpm
File outdated by:  RHSA-2013:1269
    MD5: 4c042b8fd34553300f6ee0da238f08f7
SHA-256: 8a6bb9e5d73880c1f71ac2a869b57b975a6af483caed795d7d203823e405cbcf
 
x86_64:
thunderbird-10.0.12-3.el5_9.x86_64.rpm
File outdated by:  RHSA-2013:1269
    MD5: 813b5ae6828f2973e7ccad035e64e4e5
SHA-256: b795fa0f0c82fdf07772b4ed99e03c917f10a9d90f9bf1030a7966db2a7eaae7
thunderbird-debuginfo-10.0.12-3.el5_9.x86_64.rpm
File outdated by:  RHSA-2013:1269
    MD5: d51008054a5f866992053a6170ac9890
SHA-256: fef7dc75012f21dbc04ed81a054e4b1be9de3609fe8bdb71d365fe221cf3d143
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
thunderbird-10.0.12-3.el5_9.src.rpm
File outdated by:  RHSA-2013:1269
    MD5: 6cdd7946ba667d823b5e4768edb7b5f9
SHA-256: 26d2035f4ad97ef19e35d6eb65b3a40d1d6aa45ddcf25736e3d706ed02cb9e60
 
IA-32:
thunderbird-10.0.12-3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8f565aeecb8beb532b76008cb56d0aa8
SHA-256: 674cda4a8891722366f4b759280c0adbe3b945dd05cd1489a8a5339a90859ba8
thunderbird-debuginfo-10.0.12-3.el5_9.i386.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4c042b8fd34553300f6ee0da238f08f7
SHA-256: 8a6bb9e5d73880c1f71ac2a869b57b975a6af483caed795d7d203823e405cbcf
 
x86_64:
thunderbird-10.0.12-3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 813b5ae6828f2973e7ccad035e64e4e5
SHA-256: b795fa0f0c82fdf07772b4ed99e03c917f10a9d90f9bf1030a7966db2a7eaae7
thunderbird-debuginfo-10.0.12-3.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: d51008054a5f866992053a6170ac9890
SHA-256: fef7dc75012f21dbc04ed81a054e4b1be9de3609fe8bdb71d365fe221cf3d143
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
thunderbird-10.0.12-3.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8a941cb87682328c0e6f3c8e357644df
SHA-256: a0e7254fcda956ece0c4811d01db019219d4f7f1efd1722d9e57bb33ce35e228
 
IA-32:
thunderbird-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5c65d875ba1249227a38167c59ab230e
SHA-256: 36c2298396ef6eeee26d24d1e6af437f744aa56386f1649366d4afc545a4599c
thunderbird-debuginfo-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: e05b2b60d16419d57483dbbaeace8822
SHA-256: 6bc86dcc87af25c3cad1a11c9f2747f24c343da7359e51f1ba4743735e278b99
 
x86_64:
thunderbird-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4971b74b66836a8728c0fecd00419bb6
SHA-256: 9751d455ec2a87307f26e0a89ad7cfb9242af59aeb7dec2b58806b56ff6c9c0a
thunderbird-debuginfo-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: b12986dc12f5208e5c57d46299682913
SHA-256: 8e17695c7610ba51a82199624e53ab1a782a8c071359179ef4cd6fa113a7013e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
thunderbird-10.0.12-3.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8a941cb87682328c0e6f3c8e357644df
SHA-256: a0e7254fcda956ece0c4811d01db019219d4f7f1efd1722d9e57bb33ce35e228
 
IA-32:
thunderbird-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5c65d875ba1249227a38167c59ab230e
SHA-256: 36c2298396ef6eeee26d24d1e6af437f744aa56386f1649366d4afc545a4599c
thunderbird-debuginfo-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: e05b2b60d16419d57483dbbaeace8822
SHA-256: 6bc86dcc87af25c3cad1a11c9f2747f24c343da7359e51f1ba4743735e278b99
 
PPC:
thunderbird-10.0.12-3.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 142b5a9b9ebac1488b7546868bcc1dd7
SHA-256: 8797d7253e77902c82655abcc474a87d446433cb90941b2d9805d7b5f80fae12
thunderbird-debuginfo-10.0.12-3.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4f9ca420fc236016d6de83e91681edf4
SHA-256: 6f72a48dd73c83e2d1c923b1aa8dda670df455a0dbb6f6d1aee2018469c2c30a
 
s390x:
thunderbird-10.0.12-3.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: fe415ff92ef4a47ac3d54289557e50c7
SHA-256: ec96c967dff1e712aedbb2d7f5a0e3aec70f19e64f492d01cbef5da57a14c24f
thunderbird-debuginfo-10.0.12-3.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0316
    MD5: 379dbb4e44c51c3bb217f3e9f1362fb3
SHA-256: 0eebd40989560827541315845142a79e9afb0fc218948b23238075898299bc25
 
x86_64:
thunderbird-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4971b74b66836a8728c0fecd00419bb6
SHA-256: 9751d455ec2a87307f26e0a89ad7cfb9242af59aeb7dec2b58806b56ff6c9c0a
thunderbird-debuginfo-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: b12986dc12f5208e5c57d46299682913
SHA-256: 8e17695c7610ba51a82199624e53ab1a782a8c071359179ef4cd6fa113a7013e
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
thunderbird-10.0.12-3.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8a941cb87682328c0e6f3c8e357644df
SHA-256: a0e7254fcda956ece0c4811d01db019219d4f7f1efd1722d9e57bb33ce35e228
 
IA-32:
thunderbird-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2013:0272
    MD5: 5c65d875ba1249227a38167c59ab230e
SHA-256: 36c2298396ef6eeee26d24d1e6af437f744aa56386f1649366d4afc545a4599c
thunderbird-debuginfo-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2013:0272
    MD5: e05b2b60d16419d57483dbbaeace8822
SHA-256: 6bc86dcc87af25c3cad1a11c9f2747f24c343da7359e51f1ba4743735e278b99
 
PPC:
thunderbird-10.0.12-3.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:0272
    MD5: 142b5a9b9ebac1488b7546868bcc1dd7
SHA-256: 8797d7253e77902c82655abcc474a87d446433cb90941b2d9805d7b5f80fae12
thunderbird-debuginfo-10.0.12-3.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:0272
    MD5: 4f9ca420fc236016d6de83e91681edf4
SHA-256: 6f72a48dd73c83e2d1c923b1aa8dda670df455a0dbb6f6d1aee2018469c2c30a
 
s390x:
thunderbird-10.0.12-3.el6_3.s390x.rpm
File outdated by:  RHSA-2013:0272
    MD5: fe415ff92ef4a47ac3d54289557e50c7
SHA-256: ec96c967dff1e712aedbb2d7f5a0e3aec70f19e64f492d01cbef5da57a14c24f
thunderbird-debuginfo-10.0.12-3.el6_3.s390x.rpm
File outdated by:  RHSA-2013:0272
    MD5: 379dbb4e44c51c3bb217f3e9f1362fb3
SHA-256: 0eebd40989560827541315845142a79e9afb0fc218948b23238075898299bc25
 
x86_64:
thunderbird-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0272
    MD5: 4971b74b66836a8728c0fecd00419bb6
SHA-256: 9751d455ec2a87307f26e0a89ad7cfb9242af59aeb7dec2b58806b56ff6c9c0a
thunderbird-debuginfo-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0272
    MD5: b12986dc12f5208e5c57d46299682913
SHA-256: 8e17695c7610ba51a82199624e53ab1a782a8c071359179ef4cd6fa113a7013e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
thunderbird-10.0.12-3.el6_3.src.rpm
File outdated by:  RHSA-2014:0316
    MD5: 8a941cb87682328c0e6f3c8e357644df
SHA-256: a0e7254fcda956ece0c4811d01db019219d4f7f1efd1722d9e57bb33ce35e228
 
IA-32:
thunderbird-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: 5c65d875ba1249227a38167c59ab230e
SHA-256: 36c2298396ef6eeee26d24d1e6af437f744aa56386f1649366d4afc545a4599c
thunderbird-debuginfo-10.0.12-3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0316
    MD5: e05b2b60d16419d57483dbbaeace8822
SHA-256: 6bc86dcc87af25c3cad1a11c9f2747f24c343da7359e51f1ba4743735e278b99
 
x86_64:
thunderbird-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: 4971b74b66836a8728c0fecd00419bb6
SHA-256: 9751d455ec2a87307f26e0a89ad7cfb9242af59aeb7dec2b58806b56ff6c9c0a
thunderbird-debuginfo-10.0.12-3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0316
    MD5: b12986dc12f5208e5c57d46299682913
SHA-256: 8e17695c7610ba51a82199624e53ab1a782a8c071359179ef4cd6fa113a7013e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

891811 - CVE-2013-0769 Mozilla: Miscellaneous memory safety hazards (rv:10.0.12) (MFSA 2013-01)
891821 - CVE-2013-0762 CVE-2013-0766 CVE-2013-0767 Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02)
891824 - CVE-2013-0759 Mozilla: URL spoofing in addressbar during page loads (MFSA 2013-04)
891825 - CVE-2013-0744 Mozilla: Use-after-free when displaying table with many columns and column groups (MFSA 2013-05)
892142 - CVE-2013-0746 Mozilla: Compartment mismatch with quickstubs returned values (MFSA 2013-09)
892144 - CVE-2013-0748 Mozilla: Address space layout leaked in XBL objects (MFSA 2013-11)
892145 - CVE-2013-0750 Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12)
892148 - CVE-2013-0758 Mozilla: Chrome Object Wrapper (COW) bypass through plugin objects (MFSA 2013-15)
892149 - CVE-2013-0753 Mozilla: Use-after-free in serializeToStream (MFSA 2013-16)
892150 - CVE-2013-0754 Mozilla: Use-after-free in ListenerManager (MFSA 2013-17)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/