Secunia reports in http://secunia.com/advisories/16901/ that thunderbird
can be exploited to execute arbitrary shell commands in the context of
the user running thuderbird.
This bug has been assigned CAN-2005-2968.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)
Message-id: <email address hidden>
Date: Thu, 22 Sep 2005 16:53:02 +0200
From: Sebastian Ley <email address hidden>
To: Debian Bug Tracking System <email address hidden>
Subject: shell command execution
Package: mozilla-thunderbird
Severity: grave
Tags: security
Secunia reports in http:// secunia. com/advisories/ 16901/ that thunderbird
can be exploited to execute arbitrary shell commands in the context of
the user running thuderbird.
This bug has been assigned CAN-2005-2968.
-- System Information: ISO-8859- 15)
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=