Executive Summary
Summary | |
---|---|
Title | thunderbird security update |
Informations | |||
---|---|---|---|
Name | RHSA-2005:337 | First vendor Publication | 2005-03-23 |
Vendor | RedHat | Last vendor Modification | 2005-03-23 |
Severity (Vendor) | Critical | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated thunderbird packages that fix various bugs are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Thunderbird is a standalone mail and newsgroup client. A buffer overflow bug was found in the way Thunderbird processes GIF images. It is possible for an attacker to create a specially crafted GIF image, which when viewed by a victim will execute arbitrary code as the victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0399 to this issue. A bug was found in the Thunderbird string handling functions. If a malicious website is able to exhaust a system's memory, it becomes possible to execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0255 to this issue. Users of Thunderbird are advised to upgrade to this updated package which contains Thunderbird version 1.0.2 and is not vulnerable to these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 149883 - CAN-2005-0255 Memory overwrite in string library 150874 - |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2005-337.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:100028 | |||
Oval ID: | oval:org.mitre.oval:def:100028 | ||
Title: | Mozilla GIF Heap Overflow | ||
Description: | Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-0399 | Version: | 5 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla Mozilla Firefox Mozilla Thunderbird |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:100040 | |||
Oval ID: | oval:org.mitre.oval:def:100040 | ||
Title: | Mozilla String Library Memory Overwrite Vulnerability | ||
Description: | String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-0255 | Version: | 5 |
Platform(s): | Microsoft Windows NT Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | mozilla Mozilla Firefox Mozilla Thunderbird |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9111 | |||
Oval ID: | oval:org.mitre.oval:def:9111 | ||
Title: | The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265. | ||
Description: | String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-0255 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Mozilla Firefox GIF processing buffer overflow | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2009-05-05 | Name : HP-UX Update for Mozilla remote HPSBUX01133 File : nvt/gb_hp_ux_HPSBUX01133.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200503-10 (Firefox) File : nvt/glsa_200503_10.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200503-30 (Mozilla) File : nvt/glsa_200503_30.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200503-31 (Firefox) File : nvt/glsa_200503_31.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200503-32 (Thunderbird) File : nvt/glsa_200503_32.nasl |
2008-09-04 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox5.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
14937 | Mozilla Multiple Browser GIF Processing Overflow |
14195 | Mozilla Multiple Products MutatePrep string Library Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Mozilla GIF multipacket heap overflow - ANIMEXTS1.0 RuleID : 6503 - Revision : 9 - Type : WEB-CLIENT |
2014-01-10 | Mozilla GIF single packet heap overflow - ANIMEXTS1.0 RuleID : 6502 - Revision : 15 - Type : FILE-IMAGE |
2014-01-10 | Mozilla GIF multipacket heap overflow - NETSCAPE2.0 RuleID : 3536 - Revision : 13 - Type : WEB-CLIENT |
2014-01-10 | Mozilla GIF single packet heap overflow - NETSCAPE2.0 RuleID : 3534 - Revision : 26 - Type : FILE-IMAGE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-149-3.nasl - Type : ACT_GATHER_INFO |
2005-10-24 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_016.nasl - Type : ACT_GATHER_INFO |
2005-09-12 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-247.nasl - Type : ACT_GATHER_INFO |
2005-09-12 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-249.nasl - Type : ACT_GATHER_INFO |
2005-09-12 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-246.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_7d2aac529c6b11d999a7000a95bc6fae.nasl - Type : ACT_GATHER_INFO |
2005-05-19 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-248.nasl - Type : ACT_GATHER_INFO |
2005-05-17 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-088.nasl - Type : ACT_GATHER_INFO |
2005-03-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200503-30.nasl - Type : ACT_GATHER_INFO |
2005-03-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200503-31.nasl - Type : ACT_GATHER_INFO |
2005-03-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200503-32.nasl - Type : ACT_GATHER_INFO |
2005-03-25 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-323.nasl - Type : ACT_GATHER_INFO |
2005-03-25 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-335.nasl - Type : ACT_GATHER_INFO |
2005-03-25 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-336.nasl - Type : ACT_GATHER_INFO |
2005-03-25 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-337.nasl - Type : ACT_GATHER_INFO |
2005-03-23 | Name : A web browser installed on the remote host contains multiple vulnerabilities. File : mozilla_176.nasl - Type : ACT_GATHER_INFO |
2005-03-23 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_102.nasl - Type : ACT_GATHER_INFO |
2005-03-23 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_102.nasl - Type : ACT_GATHER_INFO |
2005-03-06 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200503-10.nasl - Type : ACT_GATHER_INFO |
2005-03-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-277.nasl - Type : ACT_GATHER_INFO |
2005-03-02 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-176.nasl - Type : ACT_GATHER_INFO |
2005-02-25 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_101.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:49:14 |
|