SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
Mozilla Thunderbird Multiple Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1027122
SecurityTracker URL:  http://securitytracker.com/id/1027122
CVE Reference:   CVE-2012-0441, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1942, CVE-2012-1943, CVE-2012-1944, CVE-2012-1945, CVE-2012-1946, CVE-2012-1947   (Links to External Site)
Date:  Jun 6 2012
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 13.0
Description:   Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937, CVE-2012-1938, CVE-2012-1939]. The code will run with the privileges of the target user.

A remote user can exploit a flaw in the Network Security Services (NSS) ASN.1 QuickDER decoder in the processing zero length items [CVE-2012-0441].

A remote user can exploit a flaw in the Mozilla updater to load a local DLL file ('wsock32.dll') in a privileged context [CVE-2012-1943]. Version 12 on Windows is affected.

A remote user can exploit a flaw in the Mozilla updater service to load an arbitrary local DLL file [CVE-2012-1942]. Version 12 on Windows is affected.

The Content Security Policy's (CSP) inline-script blocking feature may not protect against some inline event handlers [CVE-2012-1944].

A remote user can create an HTML page on a Windows share and Windows shortcut files (.lnk) on the same share that link to arbitrary locations on the target user's local file system. When the HTML page is loaded by the target user, the page can read the contents of the target linked files or directories [CVE-2012-1945].

A remote user can trigger a use-after-free in nsINode::ReplaceOrInsertBefore() when replacing/inserting a node in a document to execute arbitrary code [CVE-2012-1946].

A remote user can trigger a heap overflow in utf16_to_isolatin1() [CVE-2012-1947].

A remote user can trigger a use-after-free in nsFrameList::FirstChild() [CVE-2012-1940].

A remote user can trigger a heap overflow in nsHTMLReflowState::CalculateHypotheticalBox() [CVE-2012-1941].

Jesse Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew McCreight, Brian Bondy, Christian Holler, Olli Pettay, Boris Zbarsky, James Forshaw of Context Information Security, Adam Barth, Paul Stone, Arthur Gerkis, Kaspar Brand, and Abhishek Arya of Google reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can conduct cross-site scripting attacks.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix (13.0).

The vendor's advisories are available at:

http://www.mozilla.org/security/announce/2012/mfsa2012-34.html
http://www.mozilla.org/security/announce/2012/mfsa2012-35.html
http://www.mozilla.org/security/announce/2012/mfsa2012-36.html
http://www.mozilla.org/security/announce/2012/mfsa2012-37.html
http://www.mozilla.org/security/announce/2012/mfsa2012-38.html
http://www.mozilla.org/security/announce/2012/mfsa2012-39.html
http://www.mozilla.org/security/announce/2012/mfsa2012-40.html

Vendor URL:  www.mozilla.org/security/announce/2012/mfsa2012-34.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 7 2012 (Red Hat Issues Fix) Mozilla Thunderbird Multiple Bugs Let Remote Users Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC