SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
Mozilla Thunderbird Bugs Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code
SecurityTracker Alert ID:  1024608
SecurityTracker URL:  http://securitytracker.com/id/1024608
CVE Reference:   CVE-2010-3170, CVE-2010-3173, CVE-2010-3174, CVE-2010-3175, CVE-2010-3176, CVE-2010-3178, CVE-2010-3179, CVE-2010-3180, CVE-2010-3181, CVE-2010-3182, CVE-2010-3183   (Links to External Site)
Date:  Oct 20 2010
Impact:   Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.0.9, 3.1 prior to 3.1.5
Description:   Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger memory corruption errors and execute arbitrary code on the target system [CVE-2010-3174, CVE-2010-3175, CVE-2010-3176]. The code will run with the privileges of the target user.

A specially crafted 'document.write' call can trigger a stack memory error [CVE-2010-3179].

A use-after-free error in nsBarProp can trigger code execution [CVE-2010-3180].

A dangling pointer vulnerability in LookupGetterOrSetter() can trigger code execution [CVE-2010-3183].

A page that opens a new window and uses a javascript: URL to make a modal call can access information from a different domain [CVE-2010-3178].

When an SSL certificate is created with a common name containing a wildcard followed by a partial IP address, the browser can establish a valid SSL connection with a server with an IP address that matches the wildcard range [CVE-2010-3170].

The browser may load external libraries on Windows-based systems using a relative path, allowing a user to conduct binary planting attacks [CVE-2010-3181]. A script on Linux-based systems is also affected [CVE-2010-3182].

A server can use Diffie-Hellman Ephemeral mode (DHE) with too short of a minimum key length [CVE-2010-3173].

Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov, Josh Soref, Gary Kwong, Martijn Wargers, Siddharth Agarwal, Alexander Miller, Sergey Glazunov, regenrecht (via TippingPoint's Zero Day Initiative), Eduardo Vela Nava, Richard Moore, Ehsan Akhgari, Dmitri Gribenko, and Nelson Bolyard reported these vulnerabilities.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix (3.0.9, 3.1.5).

The vendor's advisories are available at:

http://www.mozilla.org/security/announce/2010/mfsa2010-64.html
http://www.mozilla.org/security/announce/2010/mfsa2010-65.html
http://www.mozilla.org/security/announce/2010/mfsa2010-66.html
http://www.mozilla.org/security/announce/2010/mfsa2010-67.html
http://www.mozilla.org/security/announce/2010/mfsa2010-69.html
http://www.mozilla.org/security/announce/2010/mfsa2010-70.html
http://www.mozilla.org/security/announce/2010/mfsa2010-71.html
http://www.mozilla.org/security/announce/2010/mfsa2010-72.html

Vendor URL:  www.mozilla.org/security/announce/2010/mfsa2010-64.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 20 2010 (Red Hat Issues Fix) Mozilla Thunderbird Bugs Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 4 and 5.
Nov 17 2010 (Red Hat Issues Fix) Mozilla Thunderbird Bugs Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
May 2 2011 (Oracle Issues Fix for Solaris) Mozilla Thunderbird Bugs Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code
Oracle has issued a fix for Solaris 10 and OpenSolaris.



 Source Message Contents

Date:  Wed, 20 Oct 2010 01:46:34 +0000
Subject:  Mozilla Thunderbird


http://www.mozilla.org/security/announce/2010/mfsa2010-64.html
http://www.mozilla.org/security/announce/2010/mfsa2010-65.html
http://www.mozilla.org/security/announce/2010/mfsa2010-66.html
http://www.mozilla.org/security/announce/2010/mfsa2010-67.html
http://www.mozilla.org/security/announce/2010/mfsa2010-69.html
http://www.mozilla.org/security/announce/2010/mfsa2010-70.html
http://www.mozilla.org/security/announce/2010/mfsa2010-71.html
http://www.mozilla.org/security/announce/2010/mfsa2010-72.html


CVE-2010-3170
CVE-2010-3173
CVE-2010-3174
CVE-2010-3175
CVE-2010-3176
CVE-2010-3178
CVE-2010-3179
CVE-2010-3180
CVE-2010-3181
CVE-2010-3182
CVE-2010-3183



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC