Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.843171
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu Update for thunderbird USN-3278-1
Zusammenfassung:The remote host is missing an update for the 'thunderbird'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'thunderbird'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Multiple security issues were discovered in
Thunderbird. If a user were tricked in to opening a specially crafted message,
an attacker could potentially exploit these to read uninitialized memory, cause
a denial of service via application crash, or execute arbitrary code.
(CVE-2017-5429, CVE-2017-5430, CVE-2017-5436, CVE-2017-5443, CVE-2017-5444,
CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5461, CVE-2017-5467)
Multiple security issues were discovered in Thunderbird. If a user were tricked
in to opening a specially crafted website in a browsing context, an attacker
could potentially exploit these to spoof the addressbar contents, conduct
cross-site scripting (XSS) attacks, cause a denial of service via application
crash, or execute arbitrary code. (CVE-2017-5432, CVE-2017-5433, CVE-2017-5434,
CVE-2017-5435, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440,
CVE-2017-5441, CVE-2017-5442, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454,
CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466,
CVE-2017-5469, CVE-2017-10195, CVE-2017-10196, CVE-2017-10197) A flaw was
discovered in the DRBG number generation in NSS. If an attacker were able to
perform a man-in-the-middle attack, this flaw could potentially be exploited to
view sensitive information. (CVE-2017-5462)

Affected Software/OS:
thunderbird on Ubuntu 17.04,
Ubuntu 16.10,
Ubuntu 16.04 LTS,
Ubuntu 14.04 LTS

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-5429
BugTraq ID: 97940
http://www.securityfocus.com/bid/97940
Debian Security Information: DSA-3831 (Google Search)
https://www.debian.org/security/2017/dsa-3831
RedHat Security Advisories: RHSA-2017:1104
https://access.redhat.com/errata/RHSA-2017:1104
RedHat Security Advisories: RHSA-2017:1106
https://access.redhat.com/errata/RHSA-2017:1106
RedHat Security Advisories: RHSA-2017:1201
https://access.redhat.com/errata/RHSA-2017:1201
http://www.securitytracker.com/id/1038320
Common Vulnerability Exposure (CVE) ID: CVE-2017-5430
Common Vulnerability Exposure (CVE) ID: CVE-2017-5436
https://security.gentoo.org/glsa/201706-25
Common Vulnerability Exposure (CVE) ID: CVE-2017-5443
Common Vulnerability Exposure (CVE) ID: CVE-2017-5444
Common Vulnerability Exposure (CVE) ID: CVE-2017-5445
Common Vulnerability Exposure (CVE) ID: CVE-2017-5446
Common Vulnerability Exposure (CVE) ID: CVE-2017-5447
https://www.exploit-db.com/exploits/42071/
Common Vulnerability Exposure (CVE) ID: CVE-2017-5467
Common Vulnerability Exposure (CVE) ID: CVE-2017-5432
Common Vulnerability Exposure (CVE) ID: CVE-2017-5433
Common Vulnerability Exposure (CVE) ID: CVE-2017-5434
Common Vulnerability Exposure (CVE) ID: CVE-2017-5437
Common Vulnerability Exposure (CVE) ID: CVE-2017-5438
Common Vulnerability Exposure (CVE) ID: CVE-2017-5439
BugTraq ID: 103053
http://www.securityfocus.com/bid/103053
Common Vulnerability Exposure (CVE) ID: CVE-2017-5440
Common Vulnerability Exposure (CVE) ID: CVE-2017-5442
Common Vulnerability Exposure (CVE) ID: CVE-2017-5449
Common Vulnerability Exposure (CVE) ID: CVE-2017-5451
Common Vulnerability Exposure (CVE) ID: CVE-2017-5454
Common Vulnerability Exposure (CVE) ID: CVE-2017-5460
Common Vulnerability Exposure (CVE) ID: CVE-2017-5464
Common Vulnerability Exposure (CVE) ID: CVE-2017-5465
https://www.exploit-db.com/exploits/42072/
Common Vulnerability Exposure (CVE) ID: CVE-2017-5466
Common Vulnerability Exposure (CVE) ID: CVE-2017-5469
Common Vulnerability Exposure (CVE) ID: CVE-2017-5459
Common Vulnerability Exposure (CVE) ID: CVE-2017-5441
Common Vulnerability Exposure (CVE) ID: CVE-2017-5435
Common Vulnerability Exposure (CVE) ID: CVE-2017-5462
Debian Security Information: DSA-3872 (Google Search)
https://www.debian.org/security/2017/dsa-3872
https://security.gentoo.org/glsa/201705-04
Common Vulnerability Exposure (CVE) ID: CVE-2017-5461
BugTraq ID: 98050
http://www.securityfocus.com/bid/98050
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
http://www.debian.org/security/2017/dsa-3831
http://www.debian.org/security/2017/dsa-3872
https://www.oracle.com//security-alerts/cpujul2021.html
RedHat Security Advisories: RHSA-2017:1100
https://access.redhat.com/errata/RHSA-2017:1100
RedHat Security Advisories: RHSA-2017:1101
https://access.redhat.com/errata/RHSA-2017:1101
RedHat Security Advisories: RHSA-2017:1102
https://access.redhat.com/errata/RHSA-2017:1102
RedHat Security Advisories: RHSA-2017:1103
https://access.redhat.com/errata/RHSA-2017:1103
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.