Package: mozilla-thunderbird Severity: grave Tags: security Justification: user security hole
Thunderbird 1.0.5 fixes these nine security issues, some of which are classified as critical by the Mozilla developers: CAN-2005-2270: Code execution through shared function objects CAN-2005-2269: XHTML node spoofing CAN-2005-2266: Same origin violation: frame calling top.focus() CAN-2005-2265: Possible exploitable crash in InstallVersion.compareTo() CAN-2005-2261: XML scripts ran even when Javascript disabled CAN-2005-1532: Privilege escalation via non-DOM property overrides CAN-2005-1160: Privilege escalation via DOM property overrides CAN-2005-1159: Missing Install object instance checks CAN-2005-0989: Javascript "lambda" replace exposes memory contents Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-rc5 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]