Summary
The remote host is missing an update to mozilla-thunderbird announced via advisory MDVSA-2009:216.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:216 http://www.mozilla.org/security/announce/2009/mfsa2009-42.html
Insight
A number of security vulnerabilities have been discovered in the NSS and NSPR libraries and in Mozilla Thunderbird:
Security issues in nss prior to 3.12.3 could lead to a man-in-the-middle attack via a spoofed X.509 certificate (CVE-2009-2408) and md2 algorithm flaws (CVE-2009-2409), and also cause a denial-of-service and possible code execution via a long domain name in X.509 certificate (CVE-2009-2404).
A vulnerability was found in xmltok_impl.c (expat) that with specially crafted XML could be exploited and lead to a denial of service attack. Related to CVE-2009-2625.
This update provides the latest versions of the NSS and NSPR libraries and Thunderbird which are not vulnerable to these issues.
Affected: Corporate 3.0
Severity
Classification
-
CVE CVE-2009-2404, CVE-2009-2408, CVE-2009-2409, CVE-2009-2625 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities