Executive Summary
Summary | |
---|---|
Title | New Mozilla Thunderbird packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1191 | First vendor Publication | 2006-10-05 |
Vendor | Debian | Last vendor Modification | 2006-10-05 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-2788 Fernando Ribeiro discovered that a vulnerability in the getRawDER functionallows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code. CVE-2006-4340 Daniel Bleichenbacher recently described an implementation error in RSA signature verification that cause the application to incorrectly trust SSL certificates. CVE-2006-4565, CVE-2006-4566 Priit Laes reported that that a JavaScript regular expression can trigger a heap-based buffer overflow which allows remote attackers to cause a denial of service and possibly execute arbitrary code. CVE-2006-4568 A vulnerability has been discovered that allows remote attackers to bypass the security model and inject content into the sub-frame of another site. CVE-2006-4570 Georgi Guninski demonstrated that even with JavaScript disabled in mail (the default) an attacker can still execute JavaScript when a mail message is viewed, replied to, or forwarded. CVE-2006-4571 Multiple unspecified vulnerabilities in Firefox, Thunderbird and SeaMonkey allow remote attackers to cause a denial of service, corrupt memory, and possibly execute arbitrary code. For the stable distribution (sarge) these problems have been fixed in version 1.0.2-2.sarge1.0.8c.1. For the unstable distribution (sid) these problems have been fixed in version 1.5.0.7-1. We recommend that you upgrade your Mozilla Thunderbird packages. |
Original Source
Url : http://www.debian.org/security/2006/dsa-1191 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
25 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
25 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11007 | |||
Oval ID: | oval:org.mitre.oval:def:11007 | ||
Title: | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462. | ||
Description: | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-4340 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200609-19 (Firefox) File : nvt/glsa_200609_19.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200610-01 (thunderbird) File : nvt/glsa_200610_01.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200610-04 (seamonkey) File : nvt/glsa_200610_04.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200610-06 (nss) File : nvt/glsa_200610_06.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200703-05 (mozilla) File : nvt/glsa_200703_05.nasl |
2008-09-04 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox25.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1191-1 (mozilla-thunderbird) File : nvt/deb_1191_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1192-1 (mozilla) File : nvt/deb_1192_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1210-1 (mozilla-firefox) File : nvt/deb_1210_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
29013 | Mozilla Multiple Products NSS Library RSA Exponent 3 Signature Forgery |
29012 | Mozilla Multiple Products Load Images XBL JavaScript Disable Bypass |
28848 | Mozilla Multiple Unspecified Memory Corruption |
28846 | Mozilla Multiple Products targetWindow.frames[n].document.open() Cross Frame ... |
28844 | Mozilla Multiple Products JavaScript RegEx Crafted Character Set DoS |
28843 | Mozilla Multiple Products JavaScript RegEx Minimal Quantifier Overflow |
27668 | Mozilla Multiple Products nsIX509Cert getRawDER Function Double-free DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Mozilla regular expression heap corruption attempt RuleID : 8443 - Revision : 15 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla regular expression heap corruption attempt RuleID : 8442 - Revision : 2 - Type : SMTP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2006-0735.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2006-0734.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2006-0733.nasl - Type : ACT_GATHER_INFO |
2012-01-04 | Name : The SSL layer on the remote server does not properly verify signatures. File : openssl_0_9_7k_0_9_8c.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_mozilla-nss-2067.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-2088.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-382-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-381-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-361-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-352-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-351-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-350-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-296-2.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-296-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaThunderbird-2100.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaFirefox-2090.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_mozilla-nss-2071.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_seamonkey-2098.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2006_055.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-168.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-169.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-205.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-206.nasl - Type : ACT_GATHER_INFO |
2007-01-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-977.nasl - Type : ACT_GATHER_INFO |
2007-01-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-976.nasl - Type : ACT_GATHER_INFO |
2007-01-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-979.nasl - Type : ACT_GATHER_INFO |
2006-12-16 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-143.nasl - Type : ACT_GATHER_INFO |
2006-11-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1210.nasl - Type : ACT_GATHER_INFO |
2006-10-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200610-06.nasl - Type : ACT_GATHER_INFO |
2006-10-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200610-04.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1191.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1192.nasl - Type : ACT_GATHER_INFO |
2006-10-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200610-01.nasl - Type : ACT_GATHER_INFO |
2006-09-29 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200609-19.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0675.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0676.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0677.nasl - Type : ACT_GATHER_INFO |
2006-09-16 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_1507.nasl - Type : ACT_GATHER_INFO |
2006-09-16 | Name : A web browser on the remote host is prone to multiple flaws. File : seamonkey_105.nasl - Type : ACT_GATHER_INFO |
2006-09-16 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_1507.nasl - Type : ACT_GATHER_INFO |
2006-09-15 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0675.nasl - Type : ACT_GATHER_INFO |
2006-09-15 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0677.nasl - Type : ACT_GATHER_INFO |
2006-09-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0676.nasl - Type : ACT_GATHER_INFO |
2006-09-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_e6296105449b11dbba89000c6ec775d9.nasl - Type : ACT_GATHER_INFO |
2006-08-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0594.nasl - Type : ACT_GATHER_INFO |
2006-08-07 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0609.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0609.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0611.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0610.nasl - Type : ACT_GATHER_INFO |
2006-07-29 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0611.nasl - Type : ACT_GATHER_INFO |
2006-07-29 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0610.nasl - Type : ACT_GATHER_INFO |
2006-07-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0578.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:26:15 |
|