what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-051

Mandriva Linux Security Advisory 2010-051
Posted Mar 1, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-051 - Security researcher Alin Rad Pop of Secunia Research reported that the HTML parser incorrectly freed used memory when insufficient space was available to process remaining input. Under such circumstances, memory occupied by in-use objects was freed and could later be filled with attacker-controlled text. These conditions could result in the execution or arbitrary code if methods on the freed objects were subsequently called. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2009-1571
SHA-256 | 9161b7c55f138a603afbdc8c394e09baa1144b47e34cf2fa7b04047346825ed1

Mandriva Linux Security Advisory 2010-051

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:051
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mozilla-thunderbird
Date : March 1, 2010
Affected: 2008.0, 2009.1, 2010.0
_______________________________________________________________________

Problem Description:

A vulnerabilitiy has been found and corrected in mozilla-thunderbird:

Security researcher Alin Rad Pop of Secunia Research reported that
the HTML parser incorrectly freed used memory when insufficient space
was available to process remaining input. Under such circumstances,
memory occupied by in-use objects was freed and could later be filled
with attacker-controlled text. These conditions could result in the
execution or arbitrary code if methods on the freed objects were
subsequently called (CVE-2009-1571).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571
http://www.mozilla.org/security/announce/2010/mfsa2010-03.html
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
2669429882c6f2d4f896007a4b81c0cc 2008.0/i586/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.i586.rpm
8ab5c1d63809c1cbc46f52de0afc053f 2008.0/i586/mozilla-thunderbird-devel-2.0.0.23-1.3mdv2008.0.i586.rpm
c40f64b4e053d51df02c23d777615f9c 2008.0/i586/mozilla-thunderbird-enigmail-2.0.0.23-1.3mdv2008.0.i586.rpm
f43d572170fec137873c42c698abba4d 2008.0/i586/nsinstall-2.0.0.23-1.3mdv2008.0.i586.rpm
4abdb45fe3d2091d6aeb84094d8ac1a2 2008.0/SRPMS/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
6172c6e7d8852d8ec73b29ae814417fe 2008.0/x86_64/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.x86_64.rpm
e691518e1dd9120b3ec55cc80af4e928 2008.0/x86_64/mozilla-thunderbird-devel-2.0.0.23-1.3mdv2008.0.x86_64.rpm
a30f96d07eea85b6678d3469a5b88f91 2008.0/x86_64/mozilla-thunderbird-enigmail-2.0.0.23-1.3mdv2008.0.x86_64.rpm
81b4ddb1e4eecc848c4cbc37bd3f4b87 2008.0/x86_64/nsinstall-2.0.0.23-1.3mdv2008.0.x86_64.rpm
4abdb45fe3d2091d6aeb84094d8ac1a2 2008.0/SRPMS/mozilla-thunderbird-2.0.0.23-1.3mdv2008.0.src.rpm

Mandriva Linux 2009.1:
d68983379c1ca52f6c0a4175e79cd640 2009.1/i586/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.i586.rpm
9e89756f135bdaa72bf6b511ee667ead 2009.1/i586/mozilla-thunderbird-devel-2.0.0.23-0.4mdv2009.1.i586.rpm
bbf5f3bda970bb86ce55b66e12e64907 2009.1/i586/mozilla-thunderbird-enigmail-2.0.0.23-0.4mdv2009.1.i586.rpm
c1a46fbffdd4d2fc5c101fcc55b902b6 2009.1/i586/nsinstall-2.0.0.23-0.4mdv2009.1.i586.rpm
72d65ce1a53e8844e8c71f621fdadc18 2009.1/SRPMS/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
802e7555022b4baf6f28269f04682bce 2009.1/x86_64/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.x86_64.rpm
122a5efa00ccc3dafbe270f14a1962cf 2009.1/x86_64/mozilla-thunderbird-devel-2.0.0.23-0.4mdv2009.1.x86_64.rpm
49fb3867b121998c86c120ae42d4b9fc 2009.1/x86_64/mozilla-thunderbird-enigmail-2.0.0.23-0.4mdv2009.1.x86_64.rpm
6f9df106772918d05836526a11f40e16 2009.1/x86_64/nsinstall-2.0.0.23-0.4mdv2009.1.x86_64.rpm
72d65ce1a53e8844e8c71f621fdadc18 2009.1/SRPMS/mozilla-thunderbird-2.0.0.23-0.4mdv2009.1.src.rpm

Mandriva Linux 2010.0:
9ef8f1537843b2c490ca143f3483ff90 2010.0/i586/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.i586.rpm
c79d2b30bacc364d332369b5af9bdd63 2010.0/i586/mozilla-thunderbird-devel-2.0.0.23-3.3mdv2010.0.i586.rpm
ba2eb612b17795a6c0bbbde7494a14d3 2010.0/i586/mozilla-thunderbird-enigmail-2.0.0.23-3.3mdv2010.0.i586.rpm
6df1a02ac8002218f5b1e47a2fff9925 2010.0/i586/nsinstall-2.0.0.23-3.3mdv2010.0.i586.rpm
62a8bf250e22e2bd78f0cb2baa0199d1 2010.0/SRPMS/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
9237ccb3f2930777857bf4e2e9316b19 2010.0/x86_64/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.x86_64.rpm
e5fba2b9e3b714887cfef59028c58da0 2010.0/x86_64/mozilla-thunderbird-devel-2.0.0.23-3.3mdv2010.0.x86_64.rpm
f1e53699bf38123350a4cde8ad89a506 2010.0/x86_64/mozilla-thunderbird-enigmail-2.0.0.23-3.3mdv2010.0.x86_64.rpm
099f31525f8a73242481bc121a05f811 2010.0/x86_64/nsinstall-2.0.0.23-3.3mdv2010.0.x86_64.rpm
62a8bf250e22e2bd78f0cb2baa0199d1 2010.0/SRPMS/mozilla-thunderbird-2.0.0.23-3.3mdv2010.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLi9A8mqjQ0CJFipgRAkImAJ41DNpzlsxgL4mcgno2vaH6wp0orwCeLwLp
9hu9AdJuRCtviuTpmOgBGBA=
=HwoH
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close