First published: Tue Jul 20 2010(Updated: )
Mozilla Thunderbird is a standalone mail and newsgroup client.<br>A memory corruption flaw was found in the way Thunderbird decoded certain<br>PNG images. An attacker could create a mail message containing a<br>specially-crafted PNG image that, when opened, could cause Thunderbird to<br>crash or, potentially, execute arbitrary code with the privileges of the<br>user running Thunderbird. (CVE-2010-1205)<br>Several flaws were found in the processing of malformed HTML mail content.<br>An HTML mail message containing malicious content could cause Thunderbird<br>to crash or, potentially, execute arbitrary code with the privileges of the<br>user running Thunderbird. (CVE-2010-0174, CVE-2010-1200, CVE-2010-1211,<br>CVE-2010-1214, CVE-2010-2753)<br>An integer overflow flaw was found in the processing of malformed HTML mail<br>content. An HTML mail message containing malicious content could cause<br>Thunderbird to crash or, potentially, execute arbitrary code with the<br>privileges of the user running Thunderbird. (CVE-2010-1199)<br>Several use-after-free flaws were found in Thunderbird. Viewing an HTML<br>mail message containing malicious content could result in Thunderbird<br>executing arbitrary code with the privileges of the user running<br>Thunderbird. (CVE-2010-0175, CVE-2010-0176, CVE-2010-0177)<br>A flaw was found in the way Thunderbird plug-ins interact. It was possible<br>for a plug-in to reference the freed memory from a different plug-in,<br>resulting in the execution of arbitrary code with the privileges of the<br>user running Thunderbird. (CVE-2010-1198)<br>A flaw was found in the way Thunderbird handled the "Content-Disposition:<br>attachment" HTTP header when the "Content-Type: multipart" HTTP header was<br>also present. Loading remote HTTP content that allows arbitrary uploads and<br>relies on the "Content-Disposition: attachment" HTTP header to prevent<br>content from being displayed inline, could be used by an attacker to serve<br>malicious content to users. (CVE-2010-1197)<br>A same-origin policy bypass flaw was found in Thunderbird. Remote HTML<br>content could steal private data from different remote HTML content<br>Thunderbird has loaded. (CVE-2010-2754)<br>All Thunderbird users should upgrade to this updated package, which<br>resolves these issues. All running instances of Thunderbird must be<br>restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thunderbird | <2.0.0.24-6.el5 | 2.0.0.24-6.el5 |
redhat/thunderbird | <2.0.0.24-6.el5 | 2.0.0.24-6.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.