Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
(Red Hat Issues Fix) Mozilla Thunderbird Multiple Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1027129|
SecurityTracker URL: http://securitytracker.com/id/1027129
CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1944, CVE-2012-1945, CVE-2012-1946, CVE-2012-1947
(Links to External Site)
Date: Jun 7 2012
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): prior to 13.0|
Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.|
A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937, CVE-2012-1938, CVE-2012-1939]. The code will run with the privileges of the target user.
A remote user can exploit a flaw in the Network Security Services (NSS) ASN.1 QuickDER decoder in the processing zero length items [CVE-2012-0441].
A remote user can exploit a flaw in the Mozilla updater to load a local DLL file ('wsock32.dll') in a privileged context [CVE-2012-1943]. Version 12 on Windows is affected.
A remote user can exploit a flaw in the Mozilla updater service to load an arbitrary local DLL file [CVE-2012-1942]. Version 12 on Windows is affected.
The Content Security Policy's (CSP) inline-script blocking feature may not protect against some inline event handlers [CVE-2012-1944].
A remote user can create an HTML page on a Windows share and Windows shortcut files (.lnk) on the same share that link to arbitrary locations on the target user's local file system. When the HTML page is loaded by the target user, the page can read the contents of the target linked files or directories [CVE-2012-1945].
A remote user can trigger a use-after-free in nsINode::ReplaceOrInsertBefore() when replacing/inserting a node in a document to execute arbitrary code [CVE-2012-1946].
A remote user can trigger a heap overflow in utf16_to_isolatin1() [CVE-2012-1947].
A remote user can trigger a use-after-free in nsFrameList::FirstChild() [CVE-2012-1940].
A remote user can trigger a heap overflow in nsHTMLReflowState::CalculateHypotheticalBox() [CVE-2012-1941].
Jesse Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew McCreight, Brian Bondy, Christian Holler, Olli Pettay, Boris Zbarsky, James Forshaw of Context Information Security, Adam Barth, Paul Stone, Arthur Gerkis, Kaspar Brand, and Abhishek Arya of Google reported these vulnerabilities.
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.|
A remote user can conduct cross-site scripting attacks.
A remote user can obtain potentially sensitive information.
Red Hat has issued a fix for CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1944, CVE-2012-1945, CVE-2012-1946, and CVE-2012-1947.|
The Red Hat advisory is available at:
Vendor URL: www.mozilla.org/security/announce/2012/mfsa2012-34.html (Links to External Site)
Access control error, Boundary error|
Linux (Red Hat Enterprise)|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Date: Wed, 6 Jun 2012 23:49:15 +0000|
Subject: [RHSA-2012:0715-01] Critical: thunderbird security update
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Critical: thunderbird security update
Advisory ID: RHSA-2012:0715-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0715.html
Issue date: 2012-06-06
CVE Names: CVE-2011-3101 CVE-2012-1937 CVE-2012-1938
CVE-2012-1939 CVE-2012-1940 CVE-2012-1941
CVE-2012-1944 CVE-2012-1945 CVE-2012-1946
An updated thunderbird package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Mozilla Thunderbird is a standalone mail and newsgroup client.
Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2011-3101,
CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941,
Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers
with graphics cards that have hardware acceleration enabled.
It was found that the Content Security Policy (CSP) implementation in
Thunderbird no longer blocked Thunderbird inline event handlers. Malicious
content could possibly bypass intended restrictions if that content relied
on CSP to protect against flaws such as cross-site scripting (XSS).
If a web server hosted content that is stored on a Microsoft Windows share,
or a Samba share, loading such content with Thunderbird could result in
Windows shortcut files (.lnk) in the same share also being loaded. An
attacker could use this flaw to view the contents of local files and
directories on the victim's system. This issue also affected users opening
content from Microsoft Windows shares, or Samba shares, that are mounted
on their systems. (CVE-2012-1945)
Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Ken Russell of Google as the original reporter of
CVE-2011-3101; Igor Bukanov, Olli Pettay, Boris Zbarsky, and Jesse Ruderman
as the original reporters of CVE-2012-1937; Jesse Ruderman, Igor Bukanov,
Bill McCloskey, Christian Holler, Andrew McCreight, and Brian Bondy as the
original reporters of CVE-2012-1938; Christian Holler as the original
reporter of CVE-2012-1939; security researcher Abhishek Arya of Google as
the original reporter of CVE-2012-1940, CVE-2012-1941, and CVE-2012-1947;
security researcher Arthur Gerkis as the original reporter of
CVE-2012-1946; security researcher Adam Barth as the original reporter of
CVE-2012-1944; and security researcher Paul Stone as the original reporter
Note: None of the issues in this advisory can be exploited by a
for mail messages. They could be exploited another way in Thunderbird, for
example, when viewing the full remote content of an RSS feed.
All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 10.0.5 ESR, which corrects these issues. After
installing the update, Thunderbird must be restarted for the changes to
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
5. Bugs fixed (http://bugzilla.redhat.com/):
827829 - CVE-2011-3101 CVE-2012-1937 CVE-2012-1938 CVE-2012-1939 CVE-2012-3105 Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34)
827830 - CVE-2012-1944 Mozilla: Content Security Policy inline-script bypass (MFSA 2012-36)
827831 - CVE-2012-1945 Mozilla: Information disclosure though Windows file shares and shortcut files (MFSA 2012-37)
827832 - CVE-2012-1946 Mozilla: Use-after-free while replacing/inserting a node in a document (MFSA 2012-38)
827843 - CVE-2012-1940 CVE-2012-1941 CVE-2012-1947 Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40)
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
RHEL Optional Productivity Applications (v. 5 server):
Red Hat Enterprise Linux Desktop (v. 6):
Red Hat Enterprise Linux Server Optional (v. 6):
Red Hat Enterprise Linux Workstation (v. 6):
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
-----END PGP SIGNATURE-----
RHSA-announce mailing list
Go to the Top of This SecurityTracker Archive Page