USN-1367-3: Thunderbird vulnerability

Ubuntu Security Notice USN-1367-3

17th February, 2012

thunderbird vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 11.04
  • Ubuntu 10.10
  • Ubuntu 10.04 LTS

Summary

Thunderbird could be made to crash or run programs as your login if it opened a specially crafted file.

Software description

  • thunderbird - Mozilla Open Source mail and newsgroup client

Details

USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding
update for Thunderbird.

Original advisory details:

Jueri Aedla discovered that libpng did not properly verify the size used
when allocating memory during chunk decompression. If a user or automated
system using libpng were tricked into opening a specially crafted image,
an attacker could exploit this to cause a denial of service or execute
code with the privileges of the user invoking the program. (CVE-2011-3026)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 11.04:
thunderbird 3.1.19+build1+nobinonly-0ubuntu0.11.04.1
Ubuntu 10.10:
thunderbird 3.1.19+build1+nobinonly-0ubuntu0.10.10.1
Ubuntu 10.04 LTS:
thunderbird 3.1.19+build1+nobinonly-0ubuntu0.10.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Thunderbird to make all
the necessary changes.

References

CVE-2011-3026, LP: 933399