Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2010.0234 Mozilla have released a new version of Thunderbird 29 October 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Thunderbird Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2010-3765 Member content until: Sunday, November 28 2010 Reference: ASB-2010.0233 ESB-2010.0981 OVERVIEW Mozilla have released a new version of Thunderbird, correcting a critical security vulnerability. IMPACT The vendor has provided the following details regarding this vulnerability which has been assigned CVE-2010-3765: "Morten Krkvik of Telenor SOC reported an exploit targeting particular versions of Firefox 3.6 on Windows XP that Telenor found while investigating an intrusion attempt on a customer network. The underlying vulnerability, however, was present on both the Firefox 3.5 and Firefox 3.6 development branches and affected all supported platforms. Note: Reading mail in Thunderbird does not pose a risk to users, however the vulnerability is present and could be triggered in RSS feeds if JavaScript is enabled or by an add-on that enables browser- like functionality." [1] MITIGATION The latest version of Thunderbird is available for download from the vendor's website. [2] REFERENCES [1] Mozilla Foundation Security Advisory 2010-73 http://www.mozilla.org/security/announce/2010/mfsa2010-73.html [2] Thunderbird - It's All Yours http://www.mozillamessaging.com/en-US/thunderbird/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFMyjjU/iFOrG6YcBERAkJ4AJ9PGKVIFkLrtbfMrpMjz9aGSUfUNACgicor LQNX/lvRiloF4viKyEWyAVI= =Rug3 -----END PGP SIGNATURE-----