[arch-security] [ASA-201609-3] thunderbird: arbitrary code execution
Arch Linux Security Advisory ASA-201609-3 ========================================= Severity: Critical Date : 2016-09-04 CVE-ID : CVE-2016-2835 CVE-2016-2836 Package : thunderbird Type : arbitrary code execution Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package thunderbird before version 45.3.0-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 45.3.0-1. # pacman -Syu "thunderbird>=45.3.0-1" The problems have been fixed upstream in version 45.3.0. Workaround ========== None. Description =========== - CVE-2016-2835 (arbitrary code execution) Carsten Book, Christian Holler, Gary Kwong, Jesse Ruderman, Andrew McCreight, Phil Ringnalda and Philipp reported memory safety problems and crashes. - CVE-2016-2836 (arbitrary code execution) Christian Holler, Tyson Smith, Boris Zbarsky, Byron Campen, and Julian Seward reported memory safety problems and crashes. Impact ====== A remote attacker can execute arbitrary code on the affected host. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa2016-62/ https://access.redhat.com/security/cve/CVE-2016-2835 https://access.redhat.com/security/cve/CVE-2016-2836
participants (1)
-
Remi Gacogne