Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@××××××××××××.org
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200503-32 ] Mozilla Thunderbird: Multiple vulnerabilities
Date: Fri, 25 Mar 2005 13:21:37
Message-Id: 4244105D.1070707@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200503-32
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Mozilla Thunderbird: Multiple vulnerabilities
9 Date: March 25, 2005
10 Bugs: #84075
11 ID: 200503-32
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Mozilla Thunderbird is vulnerable to multiple issues, including the
19 remote execution of arbitrary code through malicious GIF images.
20
21 Background
22 ==========
23
24 Mozilla Thunderbird is the next-generation mail client from the Mozilla
25 project.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 mozilla-thunderbird < 1.0.2 >= 1.0.2
34 2 mozilla-thunderbird-bin < 1.0.2 >= 1.0.2
35 -------------------------------------------------------------------
36 2 affected packages on all of their supported architectures.
37 -------------------------------------------------------------------
38
39 Description
40 ===========
41
42 The following vulnerabilities were found and fixed in Mozilla
43 Thunderbird:
44
45 * Mark Dowd from ISS X-Force reported an exploitable heap overrun in
46 the GIF processing of obsolete Netscape extension 2 (CAN-2005-0399)
47
48 * Daniel de Wildt and Gael Delalleau discovered a memory overwrite in
49 a string library (CAN-2005-0255)
50
51 * Wind Li discovered a possible heap overflow in UTF8 to Unicode
52 conversion (CAN-2005-0592)
53
54 * Phil Ringnalda reported a possible way to spoof Install source with
55 user:pass@host (CAN-2005-0590)
56
57 Impact
58 ======
59
60 The GIF heap overflow could be triggered by a malicious GIF image that
61 would end up executing arbitrary code with the rights of the user
62 running Thunderbird. The other overflow issues, while not thought to be
63 exploitable, would have the same impact. Furthermore, by setting up
64 malicious websites and convincing users to follow untrusted links,
65 attackers may leverage the spoofing issue to trick user into installing
66 malicious extensions.
67
68 Workaround
69 ==========
70
71 There is no known workaround at this time.
72
73 Resolution
74 ==========
75
76 All Mozilla Thunderbird users should upgrade to the latest version:
77
78 # emerge --sync
79 # emerge --ask --oneshot --verbose
80 ">=mail-client/mozilla-thunderbird-1.0.2"
81
82 All Mozilla Thunderbird binary users should upgrade to the latest
83 version:
84
85 # emerge --sync
86 # emerge --ask --oneshot --verbose
87 ">=mail-client/mozilla-thunderbird-bin-1.0.2"
88
89 References
90 ==========
91
92 [ 1 ] CAN-2005-0255
93 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255
94 [ 2 ] CAN-2005-0399
95 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399
96 [ 3 ] CAN-2005-0590
97 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590
98 [ 4 ] CAN-2005-0592
99 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592
100 [ 5 ] Mozilla Security Advisories
101 http://www.mozilla.org/projects/security/known-vulnerabilities.html
102
103 Availability
104 ============
105
106 This GLSA and any updates to it are available for viewing at
107 the Gentoo Security Website:
108
109 http://security.gentoo.org/glsa/glsa-200503-32.xml
110
111 Concerns?
112 =========
113
114 Security is a primary focus of Gentoo Linux and ensuring the
115 confidentiality and security of our users machines is of utmost
116 importance to us. Any security concerns should be addressed to
117 security@g.o or alternatively, you may file a bug at
118 http://bugs.gentoo.org.
119
120 License
121 =======
122
123 Copyright 2005 Gentoo Foundation, Inc; referenced text
124 belongs to its owner(s).
125
126 The contents of this document are licensed under the
127 Creative Commons - Attribution / Share Alike license.
128
129 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature