summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-200610-01.xml
blob: 5fbad39c54bbcb5f030b48266b264acf29a33096 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200610-01">
  <title>Mozilla Thunderbird: Multiple vulnerabilities</title>
  <synopsis>
    The Mozilla Foundation has reported multiple security vulnerabilities
    related to Mozilla Thunderbird.
  </synopsis>
  <product type="ebuild">thunderbird</product>
  <announced>2006-10-04</announced>
  <revised count="01">2006-10-04</revised>
  <bug>147653</bug>
  <access>remote</access>
  <affected>
    <package name="mail-client/mozilla-thunderbird" auto="yes" arch="*">
      <unaffected range="ge">1.5.0.7</unaffected>
      <vulnerable range="lt">1.5.0.7</vulnerable>
    </package>
    <package name="mail-client/mozilla-thunderbird-bin" auto="yes" arch="*">
      <unaffected range="ge">1.5.0.7</unaffected>
      <vulnerable range="lt">1.5.0.7</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    The Mozilla Thunderbird mail client is a redesign of the Mozilla Mail
    component.
    </p>
  </background>
  <description>
    <p>
    A number of vulnerabilities have been found and fixed in Mozilla
    Thunderbird. For details please consult the references below.
    </p>
  </description>
  <impact type="normal">
    <p>
    The most severe vulnerabilities might lead to the execution of
    arbitrary code with the rights of the user running the application.
    Other vulnerabilities include program crashes and the acceptance of
    forged certificates.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Mozilla Thunderbird users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.7"</code>
    <p>
    All Mozilla Thunderbird binary users should upgrade to the latest
    version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.7"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
  </references>
  <metadata tag="requester" timestamp="2006-09-28T19:46:25Z">
    vorlon078
  </metadata>
  <metadata tag="bugReady" timestamp="2006-09-29T21:05:25Z">
    vorlon078
  </metadata>
  <metadata tag="submitter" timestamp="2006-09-30T21:18:44Z">
    vorlon078
  </metadata>
</glsa>