U radu programskog paketa thunderbird uočen je i ispravljen novi sigurnosni propust. Udaljeni napadač ga može iskoristiti za otkrivanje i izmjenu osjetljivih informacija.
Paket:
thunderbird 7.x
Operacijski sustavi:
Fedora 16
Kritičnost:
3.7
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
izmjena podataka, otkrivanje osjetljivih informacija
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-3389
Izvorni ID preporuke:
FEDORA-2011-17400
Izvor:
Fedora
Problem:
Sigurnosni propust se javlja zbog nepravilnosti u implementaciji SSL protokola.
Posljedica:
Udaljeni napadač navedeni nedostatak može iskoristiti za otkrivanje i izmjenu podataka.
Rješenje:
Svim se korisnicima, u svrhu zaštite sigurnosti, savjetuje njegova nadogradnja na novije inačice.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-17400
2011-12-23 03:11:11.857642
--------------------------------------------------------------------------------
Name : thunderbird
Product : Fedora 16
Version : 9.0
Release : 4.fc16
URL : http://www.mozilla.org/projects/thunderbird/
Summary : Mozilla Thunderbird mail/newsgroup client
Description :
Mozilla Thunderbird is a standalone mail and newsgroup client.
--------------------------------------------------------------------------------
Update Information:
The latest version of Firefox and Thunderbird have the following changes:
* Added Type Inference, significantly improving JavaScript performance
* Added support for querying Do Not Track status via JavaScript
* Added support for font-stretch
* Improved support for text-overflow
* Improved standards support for HTML5, MathML, and CSS
* Fixed several stability issues
* Fixed several security issues
Update nss to 3.13.1
You can find the new features and bug fixes in NSS 3.13 and 3.13.1 with these
Bugzilla queries:
https://bugzilla.mozilla.org/buglist.cgi?list_id=1496878&resolution=FIXED&classification=Components&query_format=advanced&target_milestone=3.13&product=NSS
and
https://bugzilla.mozilla.org/buglist.cgi?list_id=1496878&resolution=FIXED&classification=Components&query_format=advanced&target_milestone=3.13.1&product=NSS
Notable changes include:
1. SSL 2.0 is disabled by default.
2. A defense against the SSL 3.0 and TLS 1.0 CBC chosen plaintext attack
demonstrated by Rizzo and Duong (CVE-2011-3389) is enabled by default.
Set the SSL_CBC_RANDOM_IV SSL option to PR_FALSE to disable it.
3. SHA-224 is supported.
4. Added PORT_ErrorToString and PORT_ErrorToName to return the
error message and symbolic name of an NSS error code.
5. Added NSS_GetVersion to return the NSS version string.
6. Added experimental support of RSA-PSS to the softoken only
(contributed by Hanno BÄ
Posljednje sigurnosne preporuke