SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
(CentOS Issues Fix) Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1033402
SecurityTracker URL:  http://securitytracker.com/id/1033402
CVE Reference:   CVE-2015-4473, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4491   (Links to External Site)
Date:  Aug 28 2015
Impact:   Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 38.2
Description:   Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges on the target system.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system.

Some memory corruption errors may occur [CVE-2015-4473, CVE-2015-4474].

Some memory errors may occur [CVE-2015-4487, CVE-2015-4488, CVE-2015-4489].

On Windows-based systems, a local user can trigger a hardlink race condition to cause the Mozilla Maintenance Service to write its log file to a restricted location with an arbitrary file name. This can be exploited to gain elevated privileges on the target system [CVE-2015-4481].

A remote user can create a MAR file with a specially crafted name that, when opened, will trigger an out-of-bounds write and potentially execute arbitrary code [CVE-2015-4482].

On Linux systems running Gnome, a remote user scale a specially crafted bitmap image to trigger a heap overflow in gdk-pixbuf and potentially execute arbitrary code [CVE-2015-4491].

Gary Kwong, Christian Holler, Byron Campen, Tyson Smith, Bobby Holley, Chris Coulson, Eric Rahm, James Forshaw, Holger Fuhrmannek, Gustavo Grieco, and Ronald Crane reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A local user can obtain elevated privileges on the target system.

Solution:   CentOS has issued a fix for CVE-2015-4473, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, and CVE-2015-4491.

i386:
4a3c17746a0f6eb4538da53dedb6ce365d7e26b3922ca2764ad95cb6552985be thunderbird-38.2.0-4.el5.centos.i386.rpm

x86_64:
085dda14f0c68b842c7b691e9ae8797cab53e0d4b9f21d6b739b023f53181e2d thunderbird-38.2.0-4.el5.centos.x86_64.rpm

Source:
caa0713b07db9133ad60279eebf11190f87a1113c9142276756f8cbbe8e1cd50 thunderbird-38.2.0-4.el5.centos.src.rpm

i386:
212a3fb8ffd55e5b884a0d3d4a93b9fa329e42ec0d3da2697cd07f4164cab75d thunderbird-38.2.0-4.el6.centos.i686.rpm

x86_64:
2f599516b2700248194b1b0349de15698e6d5834417c78e4d9de1541033bca97 thunderbird-38.2.0-4.el6.centos.x86_64.rpm

Source:
02c890e4584b486f07a69663e905d4658aa623f1bd38f8ff107707324a06962f thunderbird-38.2.0-4.el6.centos.src.rpm

x86_64:
492a01e64a18f0d1800361dfd73d9678a07ce1c1eb75908e1c2c6a77dec9bfd8 thunderbird-38.2.0-1.el7.centos.x86_64.rpm

Source:
2a4b617361ac4ba011498b67672a799e315d1db60db9804a63af67efbe454380 thunderbird-38.2.0-1.el7.centos.src.rpm

Cause:   Access control error, Boundary error
Underlying OS:  Linux (CentOS)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 25 2015 Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  [CentOS-announce] CESA-2015:1682 Important CentOS 7 thunderbird Security Update


CentOS Errata and Security Advisory 2015:1682 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1682.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
492a01e64a18f0d1800361dfd73d9678a07ce1c1eb75908e1c2c6a77dec9bfd8  thunderbird-38.2.0-1.el7.centos.x86_64.rpm

Source:
2a4b617361ac4ba011498b67672a799e315d1db60db9804a63af67efbe454380  thunderbird-38.2.0-1.el7.centos.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC