SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
Mozilla Thunderbird Bugs Permit Arbitrary Code Execution, Cross-Site Scripting, and HTTP Response Smuggling
SecurityTracker Alert ID:  1016214
SecurityTracker URL:  http://securitytracker.com/id/1016214
CVE Reference:   CVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2786, CVE-2006-2787   (Links to External Site)
Updated:  May 22 2009
Original Entry Date:  Jun 2 2006
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.5.0.4
Description:   Several vulnerabilities were reported in Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting and HTTP response smuggling attacks.

A remote user can create HTML using Unicode Byte-order-Mark (BOM) on UTF-8 encoded pages to potentially execute arbitrary scripting code on the target user's e-mail client [MFSA 2006-42]. Masatoshi Kimura reported this vulnerability.

A remote user can create a specially crafted (and large) vCard containing invalid Base64 characters to trigger a double-free error [MFSA 2006-40]. This may allow a remote user to execute arbitrary code on the target user's system. Masatoshi Kimura reported this vulnerability.

A remote user can pass optional Certificate Authority name arguments to trigger an array index pointer overflow in crypto.signText() [MFSA 2006-38]. Mikolaj Habryn reported this vulnerability.

A remote user can invoke content-defined setters on an object prototype to execute arbitrary code with elevated privileges [MFSA 2006-37]. Paul Nickerson reported this vulnerability and moz_bug_r_a4 developed a demonstration exploit proof-of-concept.

Under certain circumstances, persisted XUL attributes may be associated with the wrong URL. A remote user may be able to exploit this to execute arbitrary code on the target user's system [MFSA 2006-35]. Jonas Sicking reported this vulnerability.

A remote user can conduct HTTP response smuggling attacks against the target user when Thunderbird is used with certain proxy servers [MFSA 2006-33]. Kazuho Oku of Cybozu Labs reported this vulnerability.

A remote user may be able to cause the target user's e-mail client to crash or execute arbitrary code [MFSA 2006-32]. The vendor discovered these vulnerabilities.

A remote user can create javascript to be run via EvalInSandbox that can escape the sandbox and gain elevated privileges [MFSA 2006-31]. The javascript can call the valueOf() function on objects created outside the sandbox. moz_bug_r_a4 reported this vulnerability.

Impact:   A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can conduct cross-site scripting and HTTP response smuggling attacks.

Solution:   The vendor has issued a fixed version (1.5.0.4), available at:

http://www.mozilla.com/thunderbird/

Vendor URL:  www.mozilla.com/thunderbird/ (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC