exploit the possibilities

Debian Security Advisory 4464-1

Debian Security Advisory 4464-1
Posted Jun 17, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4464-1 - Multiple security issues have been found in Thunderbird which may lead to the execution of arbitrary code if malformed email messages are read.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2019-11703, CVE-2019-11704, CVE-2019-11705, CVE-2019-11706
MD5 | bd7c71ca7bb27b5c0fbe7260ac8e8038

Debian Security Advisory 4464-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4464-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 15, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : thunderbird
CVE ID : CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706

Multiple security issues have been found in Thunderbird which may lead
to the execution of arbitrary code if malformed email messages are read.

For the stable distribution (stretch), these problems have been fixed in
version 1:60.7.1-1~deb9u1.

We recommend that you upgrade your thunderbird packages.

For the detailed security status of thunderbird please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/thunderbird

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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5ltk
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    7 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close