SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
(Oracle Issues Fix for Solaris) Mozilla Thunderbird Multiple Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1027884
SecurityTracker URL:  http://securitytracker.com/id/1027884
CVE Reference:   CVE-2012-1970, CVE-2012-1973, CVE-2012-3966   (Links to External Site)
Date:  Dec 14 2012
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to ESR 10.0.7; prior to 15.0
Description:   Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target users system [CVE-2012-1970, CVE-2012-1971, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964, CVE-2012-3966, CVE-2012-3967, CVE-2012-3968, CVE-2012-3969,
CVE-2012-3970, CVE-2012-3971, CVE-2012-3972]. The code will run with the privileges of the target user.

A remote user can shadow the window.location object using Object.defineProperty to potentially conduct cross-site scripting attacks [CVE-2012-1956].

A local user can place a specially crafted executable in the root partition on a Windows file system that will be executed by the installer [CVE-2012-3974].

A remote user can exploit a flaw in the DOMParser to obtain potentially sensitive information [CVE-2012-3975].

A remote user can bypass security checks in nsLocation::CheckURL [CVE-2012-3978].

A remote user can cause arbitrary code to be injected when the target user opens the web console [CVE-2012-3980].

The following researchers reported these vulnerabilities:

Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew Sutherland, Jason Smith, John Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya (Inferno) of Google Chrome Security Team,
Frederic Hoguin, miaubiz, Arthur Gerkis, Christoph Diehl, Nicolas Gregoire, Masato Kinugawa, vsemozhetbyt, moz_bug_r_a4, and Colby Russell.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information.

A remote user can conduct cross-site scripting attacks.

Solution:   Oracle has issued a fix for CVE-2012-1970, CVE-2012-1973, and CVE-2012-3966 for Solaris.

The Oracle advisory is available at:

https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird7

Vendor URL:  www.mozilla.org/security/announce/2012/mfsa2012-57.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  10

Message History:   This archive entry is a follow-up to the message listed below.
Aug 29 2012 Mozilla Thunderbird Multiple Bugs Let Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC