Executive Summary
Summary | |
---|---|
Title | Thunderbird vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-200-1 | First vendor Publication | 2005-10-11 |
Vendor | Ubuntu | Last vendor Modification | 2005-10-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: mozilla-thunderbird The problem can be corrected by upgrading the affected package to version 1.0.7-0ubuntu04.10 (for Ubuntu 4.10), or 1.0.7-0ubuntu05.04 (for Ubuntu 5.04). After a standard system upgrade you need to restart Thunderbird to effect the necessary changes. Details follow: A buffer overflow was discovered in the XBM image handler. By tricking an user into opening a specially crafted XBM image, an attacker could exploit this to execute arbitrary code with the user's privileges. (CAN-2005-2701) Mats Palmgren discovered a buffer overflow in the Unicode string parser. Unicode strings that contained "zero-width non-joiner" characters caused a browser crash, which could possibly even exploited to execute arbitrary code with the user's privileges. (CAN-2005-2702) Georgi Guninski reported an integer overflow in the JavaScript engine. This could be exploited to run arbitrary code under some conditions. (CAN-2005-2705) Peter Zelezny discovered that URLs which are passed to Thunderbird on the command line are not correctly protected against interpretation by the shell. If Thunderbird is configured as the default handler for "mailto:" URLs, this could be exploited to execute arbitrary code with user privileges by tricking the user into clicking on a specially crafted URL (for example, in an email or chat client). (CAN-2005-2968) This update also fixes some less critical issues which are described at http://www.mozilla.org/security/announce/mfsa2005-58.html. (CAN-2005-2703, CAN-2005-2704, CAN-2005-2706, CAN-2005-2707) The "enigmail" plugin has been updated to work with the new Thunderbird and Mozilla versions. |
Original Source
Url : http://www.ubuntu.com/usn/USN-200-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1089 | |||
Oval ID: | oval:org.mitre.oval:def:1089 | ||
Title: | XMLHttpRequest Header Spoofing Vulnerability | ||
Description: | Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to modify HTTP headers of XML HTTP requests via XMLHttpRequest, and possibly use the client to exploit vulnerabilities in servers or proxies, including HTTP request smuggling and HTTP request splitting. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2703 | Version: | 3 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11105 | |||
Oval ID: | oval:org.mitre.oval:def:11105 | ||
Title: | Firefox 1.0.6 and Mozilla 1.7.10 allows attackers to execute arbitrary commands via shell metacharacters in a URL that is provided to the browser on the command line, which is sent unfiltered to bash. | ||
Description: | Firefox 1.0.6 and Mozilla 1.7.10 allows attackers to execute arbitrary commands via shell metacharacters in a URL that is provided to the browser on the command line, which is sent unfiltered to bash. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2968 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1150 | |||
Oval ID: | oval:org.mitre.oval:def:1150 | ||
Title: | Crash on "zero-width non-joiner" Sequence | ||
Description: | Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Unicode sequences with "zero-width non-joiner" characters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2702 | Version: | 3 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1197 | |||
Oval ID: | oval:org.mitre.oval:def:1197 | ||
Title: | Firefox/Mozilla Suite Chrome Window Spoofing Vulnerability | ||
Description: | Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spawn windows without user interface components such as the address and status bar, which could be used to conduct spoofing or phishing attacks. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2707 | Version: | 3 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1272 | |||
Oval ID: | oval:org.mitre.oval:def:1272 | ||
Title: | Object Spoofing using XBL <implements> Vulnerability | ||
Description: | Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spoof DOM objects via an XBL control that implements an internal XPCOM interface. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2704 | Version: | 3 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1307 | |||
Oval ID: | oval:org.mitre.oval:def:1307 | ||
Title: | Firefox/Mozilla Suite JavaScript Integer Overflow | ||
Description: | Integer overflow in the JavaScript engine in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 might allow remote attackers to execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2705 | Version: | 3 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1443 | |||
Oval ID: | oval:org.mitre.oval:def:1443 | ||
Title: | Firefox/Mozilla Suite about: Scheme Privilege Escalation Vulnerability | ||
Description: | Firefox before 1.0.7 and Mozilla before Suite 1.7.12 allows remote attackers to execute Javascript with chrome privileges via an about: page such as about:mozilla. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2706 | Version: | 3 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1480 | |||
Oval ID: | oval:org.mitre.oval:def:1480 | ||
Title: | Heap Overrun in XBM Image Processing | ||
Description: | Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2701 | Version: | 3 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for Mozilla File : nvt/sles9p5010264.nasl |
2008-09-04 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox20.nasl |
2008-09-04 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox21.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 838-1 (mozilla-firefox) File : nvt/deb_838_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 866-1 (mozilla) File : nvt/deb_866_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 868-1 (mozilla-thunderbird) File : nvt/deb_868_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19649 | Mozilla Multiple Browser Chrome Window Spoofing |
19648 | Mozilla Multiple Browsers about: Page Privilege Escalation |
19647 | Mozilla Multiple Browser JavaScript Engine Overflow |
19646 | Mozilla Multiple Browser XBL <implements> Object Spoofing |
19645 | Mozilla Multiple Browser XMLHttpRequest Header Spoofing |
19644 | Mozilla Multiple Browser Unicode zero-width non- joiner Character DoS |
19643 | Mozilla Multiple Browsers XBM Image Processing Overflow |
19589 | Mozilla Products Command Line URL Arbitrary Shell Command Injection |
Snort® IPS/IDS
Date | Description |
---|---|
2020-01-16 | Mozilla Firefox JavaScript engine integer overflow attempt RuleID : 52473 - Revision : 1 - Type : BROWSER-FIREFOX |
2020-01-16 | Mozilla Firefox JavaScript engine integer overflow attempt RuleID : 52472 - Revision : 1 - Type : BROWSER-FIREFOX |
2015-09-03 | Mozilla Firefox JavaScript engine integer overflow attempt RuleID : 35439 - Revision : 5 - Type : BROWSER-FIREFOX |
2015-09-03 | Mozilla Firefox JavaScript engine integer overflow attempt RuleID : 35438 - Revision : 5 - Type : BROWSER-FIREFOX |
2014-11-16 | Mozilla Firefox XBM image processing buffer overflow attempt RuleID : 32133 - Revision : 2 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox Chrome Page Loading Restriction Bypass attempt RuleID : 17629 - Revision : 13 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox Unicode sequence handling stack corruption attempt RuleID : 17434 - Revision : 13 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox XBM image processing buffer overflow attempt RuleID : 17360 - Revision : 13 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox Chrome Page Loading Restriction Bypass attempt RuleID : 17213 - Revision : 9 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox command line URL shell command injection attempt RuleID : 16200 - Revision : 10 - Type : BROWSER-FIREFOX |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-05 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2005-791.nasl - Type : ACT_GATHER_INFO |
2006-07-05 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2005-785.nasl - Type : ACT_GATHER_INFO |
2006-07-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2005-789.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2e28cefb2aee11daa2630001020eed82.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_8f5dd74b2c6111daa2630001020eed82.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-200-1.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-186-1.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-174.nasl - Type : ACT_GATHER_INFO |
2005-10-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-868.nasl - Type : ACT_GATHER_INFO |
2005-10-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-866.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-791.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-170.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_058.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-789.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-785.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200509-11.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-838.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-963.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-962.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-932.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-931.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-927.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-926.nasl - Type : ACT_GATHER_INFO |
2005-09-17 | Name : A web browser on the remote host is affected by multiple vulnerabilities, inc... File : mozilla_1711.nasl - Type : ACT_GATHER_INFO |
2005-09-17 | Name : A web browser on the remote host is prone to multiple flaws, including arbitr... File : mozilla_firefox_106.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:02:39 |
|
2013-05-11 12:25:14 |
|