CERTA-2005-AVI-369
Vulnerability from certfr_avis
Une vulnérabilité dans Mozilla Thunderbird permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire à distance.
Description
Un manque de contrôle dans l'analyse des paramètres passés à Mozilla Thunderbird en ligne de commande permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire par le biais d'une adresse réticulaire (URL) malicieusement construite présente dans une application externe.
Remarque : Cette vulnérabilité n'est exploitable que sur des systèmes de type Unix et GNU/Linux.
Solution
Appliquer la mise à jour de sécurité Mozilla Thunderbird 1.0.7 corrigeant cette vulnérabilité (cf. section Documentation).
Mozilla Thunderbird 1.0.6 et versions antérieures.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMozilla Thunderbird 1.0.6 et versions ant\u00e9rieures.\u003c/P\u003e",
"content": "## Description\n\nUn manque de contr\u00f4le dans l\u0027analyse des param\u00e8tres pass\u00e9s \u00e0 Mozilla\nThunderbird en ligne de commande permet \u00e0 un utilisateur distant mal\nintentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire par le biais d\u0027une adresse\nr\u00e9ticulaire (URL) malicieusement construite pr\u00e9sente dans une\napplication externe.\n\nRemarque : Cette vuln\u00e9rabilit\u00e9 n\u0027est exploitable que sur des syst\u00e8mes de\ntype Unix et GNU/Linux.\n\n## Solution\n\nAppliquer la mise \u00e0 jour de s\u00e9curit\u00e9 Mozilla Thunderbird 1.0.7\ncorrigeant cette vuln\u00e9rabilit\u00e9 (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2005-09-30T00:00:00",
"last_revision_date": "2005-10-07T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005:174 du 06 octobre 2005 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:174"
},
{
"title": "Mise \u00e0 jour de securit\u00e9 de Mozilla Thunderbird 1.0.7 :",
"url": "http://www.mozilla.org/products/thunderbird/releases/1.0.7-release-notes.html#download"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Slackware : http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.392811",
"url": "http://salckware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.392811"
},
{
"title": "Site Internet de l\u0027\u00e9diteur :",
"url": "http://www.mozilla.org/products/thunderbird/"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 4:",
"url": "http://download.fedora.com/pub/fedora/linux/core/updates/4"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3:",
"url": "http://download.fedora.com/pub/fedora/linux/core/updates/3"
}
],
"reference": "CERTA-2005-AVI-369",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-09-30T00:00:00.000000"
},
{
"description": "Ajout des mises \u00e0 jour Fedora.",
"revision_date": "2005-10-04T00:00:00.000000"
},
{
"description": "Ajout des r\u00e9f\u00e9rences Slackware.",
"revision_date": "2005-10-06T00:00:00.000000"
},
{
"description": "Ajout des r\u00e9f\u00e9rences Mandriva.",
"revision_date": "2005-10-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Mozilla Thunderbird permet \u00e0 un utilisateur\ndistant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA2005-59 du 22 septembre 2005",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…