USN-605-1: Thunderbird vulnerabilities

Publication date

6 May 2008

Overview

Thunderbird vulnerabilities


Details

Various flaws were discovered in the JavaScript engine. If a user had
JavaScript enabled and were tricked into opening a malicious email,
an attacker could escalate privileges within Thunderbird, perform
cross-site scripting attacks and/or execute arbitrary code with the
user’s privileges. (CVE-2008-1233, CVE-2008-1234, CVE-2008-1235)

Several problems were discovered in Thunderbird which could lead to
crashes and memory corruption. If a user had JavaScript enabled and
were tricked into opening a malicious email, an attacker may be able
to execute arbitrary code with the user’s privileges. (CVE-2008-1236,
CVE-2008-1237)

Various flaws were discovered in the JavaScript engine. If a user had
JavaScript enabled and were tricked into opening a malicious email,
an attacker could escalate privileges within Thunderbird, perform
cross-site scripting attacks and/or execute arbitrary code with the
user’s privileges. (CVE-2008-1233, CVE-2008-1234, CVE-2008-1235)

Several problems were discovered in Thunderbird which could lead to
crashes and memory corruption. If a user had JavaScript enabled and
were tricked into opening a malicious email, an attacker may be able
to execute arbitrary code with the user’s privileges. (CVE-2008-1236,
CVE-2008-1237)

Update instructions

After a standard system upgrade you need to restart Thunderbird to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:


Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›