Package: mozilla-thunderbird
Severity: grave
Tags: security
Justification: user security hole

Thunderbird 1.0.5 fixes these nine security issues, some of which
are classified as critical by the Mozilla developers:

CAN-2005-2270: Code execution through shared function objects
CAN-2005-2269: XHTML node spoofing
CAN-2005-2266: Same origin violation: frame calling top.focus()
CAN-2005-2265: Possible exploitable crash in InstallVersion.compareTo()
CAN-2005-2261: XML scripts ran even when Javascript disabled
CAN-2005-1532: Privilege escalation via non-DOM property overrides
CAN-2005-1160: Privilege escalation via DOM property overrides
CAN-2005-1159: Missing Install object instance checks
CAN-2005-0989: Javascript "lambda" replace exposes memory contents

Cheers,
        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-rc5
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to