Solution
Please Install the Updated Packages.
Insight
Mozilla Thunderbird is a standalone mail and newsgroup client.
A cross-site scripting flaw was found in the way Thunderbird handled the jar: URI scheme. It may be possible for a malicious HTML mail message to leverage this flaw, and conduct a cross-site scripting attack against a user running Thunderbird. (CVE-2007-5947)
Several flaws were found in the way Thunderbird processed certain malformed HTML mail content. A HTML mail message containing malicious content could cause Thunderbird to crash, or potentially execute arbitrary code as the user running Thunderbird. (CVE-2007-5959)
A race condition existed when Thunderbird set the " window.location"
property when displaying HTML mail content. This flaw could allow a HTML mail message to set an arbitrary Referer header, which may lead to a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header for protection. (CVE-2007-5960)
All users of thunderbird are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
Affected
thunderbird on CentOS 4
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2007-5947, CVE-2007-5959, CVE-2007-5960 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities