--i7F3eY7HS/tUJxUd Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=20 Ubuntu Security Notice USN-352-1 September 25, 2006 mozilla-thunderbird vulnerabilities CVE-2006-4253, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4567, CVE-2006-4570, CVE-2006-4571 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: mozilla-thunderbird 1.5.0.7-0ubuntu0.6.06 After a standard system upgrade you need to restart Thunderbird to effect the necessary changes. Details follow: Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript. Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it. (CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4571) The NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key. (CVE-2006-4340) Jon Oberheide reported a way how a remote attacker could trick users into downloading arbitrary extensions with circumventing the normal SSL certificate check. The attacker would have to be in a position to spoof the victim's DNS, causing them to connect to sites of the attacker's choosing rather than the sites intended by the victim. If they gained that control and the victim accepted the attacker's cert for the Mozilla update site, then the next update check could be hijacked and redirected to the attacker's site without detection. (CVE-2006-4567) Georgi Guninski discovered that even with JavaScript disabled, a malicous email could still execute JavaScript when the message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. (CVE-2006-4570) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird_1.5.0.7-0ubuntu0.6.06.diff.gz Size/MD5: 454846 64c786b0c2886ff4a1cbb24fe4b76886 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird_1.5.0.7-0ubuntu0.6.06.dsc Size/MD5: 962 2560649686a20166450e44098142e80b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5: 3528618 27f6a9eec39470b434459d291cb1fbe7 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5: 193760 86704efd60c8268803fc81d9b75e4342 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5: 59010 12f13e9662d7073cb7983acb4d7f42df http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird_1.5.0.7-0ubuntu0.6.06_amd64.deb Size/MD5: 11984618 4b1a19fe4c27ed9cd753674c0201e3d7 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5: 3520394 ebda5194f4385d2349bbd8b43bc519e0 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5: 187130 cd3ff598ead2861320571a96aefb0eda http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5: 54524 647bb673f71dadb2db6f8d7d1371f1ff http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird_1.5.0.7-0ubuntu0.6.06_i386.deb Size/MD5: 10282888 0e6e3b82d902623916747a4048e23c46 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5: 3525354 cf51bead4b7313430956751fbb878d94 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5: 190474 713a352b045073a5ed9e0f2d1c125ebf http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5: 58132 e188bfb0240ab1ffe1eedb45ab8f7a65 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird_1.5.0.7-0ubuntu0.6.06_powerpc.deb Size/MD5: 11553840 cef4451a346cd1b7a8467952d37fb783 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-dev_1.5.0.7-0ubuntu0.6.06_sparc.deb Size/MD5: 3521948 3d7b32c04d4423753e1bd6dfa2e8cb1d http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-inspector_1.5.0.7-0ubuntu0.6.06_sparc.deb Size/MD5: 187916 346c9adfe5d44a87bd4efdec5a216f2f http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird-typeaheadfind_1.5.0.7-0ubuntu0.6.06_sparc.deb Size/MD5: 56012 549260b3328eb704f19299f36c1f177e http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozil= la-thunderbird_1.5.0.7-0ubuntu0.6.06_sparc.deb Size/MD5: 10753714 1e9426592ede9bd2c5364e5b6c2bb5da --i7F3eY7HS/tUJxUd Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFFF42xDecnbV4Fd/IRAvnIAKCtbjXQIOvvjHnhTpwgr5Cy2n95CwCgnfez O3XMBQeE0/3UWFcxwhdCXhI= =XXFc -----END PGP SIGNATURE----- --i7F3eY7HS/tUJxUd--