Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1362

Опубликовано: 12 окт. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-1362: thunderbird security update (CRITICAL)

[10.0.8-2.0.1.el6_3]

  • Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js
  • Replace clean.gif in tarball

[10.0.8-2]

  • Added patches from 10.0.9 ESR

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

thunderbird

10.0.8-2.0.1.el5_8

Oracle Linux i386

thunderbird

10.0.8-2.0.1.el5_8

Oracle Linux 6

Oracle Linux x86_64

thunderbird

10.0.8-2.0.1.el6_3

Oracle Linux i686

thunderbird

10.0.8-2.0.1.el6_3

Связанные CVE

Связанные уязвимости

ubuntu
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.

redhat
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.

nvd
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.

debian
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunder ...

github
больше 3 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.