首页 | 邮件资讯 | 技术教程 | 解决方案 | 产品评测 | 邮件人才 | 邮件博客 | 邮件系统论坛 | 软件下载 | 邮件周刊 | 热点专题 | 工具
网络技术 | 操作系统 | 邮件系统 | 客户端 | 电子邮箱 | 反垃圾邮件 | 邮件安全 | 邮件营销 | 移动电邮 | 邮件软件下载 | 电子书下载

邮件网络安全

系统安全 | 邮件软件漏洞 | 攻防技术 | 安全基础 | 病毒公告 | 病毒查杀 | Forefront/TMG/ISA | 防火墙 | 数字签名 |
首页 > 邮件网络安全 > 邮件软件漏洞 > Mozilla Thunderbird修复多个安全漏洞 > 正文

Mozilla Thunderbird修复多个安全漏洞

出处:绿盟科技 作者:绿盟科技 时间:2008-3-12 0:22:46
发布日期:2008-02-08
更新日期:2008-02-21

受影响系统:
Mozilla Firefox <= 2.0.0.11
Mozilla Thunderbird <= 2.0.0.11
Mozilla SeaMonkey <= 1.1.7
不受影响系统:
Mozilla Firefox 2.0.0.12
Mozilla Thunderbird 2.0.0.12
Mozilla SeaMonkey 1.1.8
描述:
BUGTRAQ  ID: 27683
CVE(CAN) ID: CVE-2008-0412,CVE-2008-0413,CVE-2008-0414,CVE-2008-0415,CVE-2008-0417,CVE-2008-0419,CVE-2008-0591,CVE-2008-0592,CVE-2008-0593,CVE-2008-0594

Firefox/Thunderbird/SeaMonkey是Mozilla所发布的WEB浏览器和邮件/新闻组客户端。

Firefox中的多个安全漏洞允许恶意用户泄露敏感信息、绕过安全限制、执行欺骗攻击或入侵用户系统。由于代码共享,Thunderbird和SeaMonkey也受这些漏洞的影响。

1) 浏览器引擎和Javascript引擎中的多个内存破坏漏洞可能导致执行任意指令。

2) 如果远程攻击者创建了MouseEvent并使用dispatchEvent将click发送给文件输入单元或文件相关的标记,就可能将文件焦点设置到文件输入的文本部分,导致有选择性的捕获键盘动作并创建可用于上传用户机器上任意文件的路径。

3) Javascript引擎中的错误可能导致以chrome权限运行Javascript代码,或通过XMLDocument.load()函数绕过同源策略。

4) 如果用户保存了口令的话,恶意站点就可能向Firefox的口令存储中注入换行符,破坏其他站点的保存口令。

5) 当用户离开使用designMode帧的页面时Firefox处理图形的方式存在漏洞,导致泄露用户的导航记录、转发导航信息或触发内存破坏。

6) 攻击者可以使用JavaScript绕过启用了定时器的安全对话,更改窗口焦点,诱骗用户在无疑中确认这类安全对话框。

7) 如果用户本地保存了带有Content-Disposition: attachment和不正确Content-Type: plain/text的文件的话,浏览器就会不再打开带有.txt扩展名的本地文件,而是提示用户保存文件。

8) Firefox会对<LINK REL="stylesheet" HREF="...">请求跟随302重新定向,然后允许通过访问element.sheet.href属性访问目标URL,这可能导致泄露敏感URL参数。

9) 如果整个网页的内容都用绝对定位包装在了<div>中,则除非用户将标签页从伪造页面切换走然后又切换回来,否则不会显示Web伪造警告对话框。

<*来源:Igor Bukanov
        Martijn Wargers
        Lars-Olof Moilanen
        Boris Zbarsky
        Carsten Book
        Charles McAuley (cmcauley@imperfectnetworks.com
        David Bloom
        Emil Ljungdahl
        Gerry Eisenhaur
  
  链接:http://secunia.com/advisories/28758/
        http://www.mozilla.org/security/announce/2008/mfsa2008-02.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-01.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-03.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-04.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-06.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-08.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-09.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-10.html
        http://www.mozilla.org/security/announce/2008/mfsa2008-11.html
        http://www.kb.cert.org/vuls/id/879056
        http://secunia.com/advisories/29049/
        https://www.redhat.com/support/errata/RHSA-2008-0105.html
        https://www.redhat.com/support/errata/RHSA-2008-0103.html
        https://www.redhat.com/support/errata/RHSA-2008-0104.html
        http://www.debian.org/security/2008/dsa-1489
        http://www.debian.org/security/2008/dsa-1485
        http://www.debian.org/security/2008/dsa-1484
        http://www.debian.org/security/2008/dsa-1506
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

http://lcamtuf.coredump.cx/ffclick2/

https://bugzilla.mozilla.org/attachment.cgi?id=292732

建议:
临时解决方法:

如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:

* 在浏览器中禁用JavaScript。

厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1506-1)以及相应补丁:
DSA-1506-1:New iceape packages fix several vulnerabilities
链接:http://www.debian.org/security/2008/dsa-1506

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b.orig.tar.gz
Size/MD5 checksum: 43535826 39071cd311888d73254336b782109776
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1.dsc
Size/MD5 checksum:     1439 eaee68845cb7d4660609f6c47ac01666
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1.diff.gz
Size/MD5 checksum:   269895 fb6e3c3d3bc4a94773c1b4921fdb42d6

Architecture independent packages:

http://security.debian.org/pool/updates/main/i/iceape/mozilla_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27208 91bbb99fad75c41e2df1170749014288
http://security.debian.org/pool/updates/main/i/iceape/mozilla-calendar_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27210 0233d457074aa58542b8662c2a54c48a
http://security.debian.org/pool/updates/main/i/iceape/mozilla-js-debugger_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27244 51f7e38462c1f39e0c662e4b58eca43a
http://security.debian.org/pool/updates/main/i/iceape/iceape-chatzilla_1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:   281870 1e8faf69c0bbf186f1a6c1d199646ce6
http://security.debian.org/pool/updates/main/i/iceape/iceape-dev_1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:  3927248 df30ff32e825d5ceb1630025a7d0ef88
http://security.debian.org/pool/updates/main/i/iceape/mozilla-dom-inspector_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27248 2b1e9711c1e80b9651b88e3dc19d4b76
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    28614 20c852fc8104981654bd6227a0602375
http://security.debian.org/pool/updates/main/i/iceape/mozilla-chatzilla_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27232 97c0a7e4b71cc083c711086dd160322a
http://security.debian.org/pool/updates/main/i/iceape/mozilla-dev_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27348 ad7233b5d98e1557cdc190d9cf6746df
http://security.debian.org/pool/updates/main/i/iceape/mozilla-mailnews_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27236 8ae02d5d250866771250e19e5bb967bb
http://security.debian.org/pool/updates/main/i/iceape/mozilla-psm_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    27220 6035bbc507f4fc30a0564aa18c5a3a98
http://security.debian.org/pool/updates/main/i/iceape/mozilla-browser_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:    28186 4997ba36f2c9aacf25eb9c41bf104d6f

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_alpha.deb
Size/MD5 checksum:   197832 c2be45e20e6834b19969e125925622a1
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_alpha.deb
Size/MD5 checksum: 60612536 5fbbf1f26498f361c0aadc0535bdee92
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_alpha.deb
Size/MD5 checksum:    53952 ef80eea66f161134bc52d0cdbf985f51
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_alpha.deb
Size/MD5 checksum:   626136 542e77b2a6ad52a40d29ecafa76c15a7
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_alpha.deb
Size/MD5 checksum:  2282858 e915238d369b469d5911e10d92be0e99
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_alpha.deb
Size/MD5 checksum: 12884578 9b5912dc643b38e5d3120d34d8685f16

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_amd64.deb
Size/MD5 checksum: 59608524 146775d1bd21250e027006f9dbf90d6f
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_amd64.deb
Size/MD5 checksum:   613832 6cb81b62325770fd1e2590908d0afda7
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_amd64.deb
Size/MD5 checksum:   195048 2ccb3800e4edcd8510d707a9ac4a5d7e
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_amd64.deb
Size/MD5 checksum: 11687282 2fc3db14be5dd03b082497ab6f9ffc36
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_amd64.deb
Size/MD5 checksum:    53366 8789d8dd06e30ce580ab37e94ec1d44b
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_amd64.deb
Size/MD5 checksum:  2099654 99aef23fe234563ce99f3d8ce89b02d2

arm architecture (ARM)

http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_arm.deb
Size/MD5 checksum:  1916734 bdda1babe619d6f11429f1fb813fc347
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_arm.deb
Size/MD5 checksum: 10421094 4cf350729bfeff5f0a6edba041e72be7
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_arm.deb
Size/MD5 checksum: 58769074 99504f3ad7121ed31583e3c77c3086e2
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_arm.deb
Size/MD5 checksum:   586096 4c1e372a14bcbe1ec4b3046be24ced89
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_arm.deb
Size/MD5 checksum:   186930 33820091037a0e30e4271e8c8c462ff9
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_arm.deb
Size/MD5 checksum:    47526 5244fa8a247df56a3f14c364107dc5b8

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_hppa.deb
Size/MD5 checksum: 60480238 50ee40317fd63bd0c7d04022e21f8f76
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_hppa.deb
Size/MD5 checksum:  2340460 70af4c1cfbd089e6a2ad548d1553093b
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_hppa.deb
Size/MD5 checksum: 12958476 f2acc587b4c985c6ea939ed1bba53de9
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_hppa.deb
Size/MD5 checksum:   615240 7e3158df6d488c6b0bfe7827cfce37ed
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_hppa.deb
Size/MD5 checksum:    54444 c7ddb1f77645cd60689dbb7a5c4b2768
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_hppa.deb
Size/MD5 checksum:   198108 967170dcf4a4a1d6687d2d0b55edaec8

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_i386.deb
Size/MD5 checksum:  1891212 ba923a32b2a34a9299cb4d5a8bad2d77
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_i386.deb
Size/MD5 checksum: 10469782 994f4b0fd8e4bd9af76fe013c7123bdc
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_i386.deb
Size/MD5 checksum:   588886 5856c66a12bf5a984668743b8b366cee
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_i386.deb
Size/MD5 checksum:   189766 ee9064d51a33a035b7a46de44d80249d
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_i386.deb
Size/MD5 checksum: 58697388 299a8786d15d0abb99d7fc6fe4b87b7f
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_i386.deb
Size/MD5 checksum:    48438 de1f808e760ee3ca502efb8276875fbf

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_ia64.deb
Size/MD5 checksum:   661876 a673cbf8efb0be476d2cd23dc514704a
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_ia64.deb
Size/MD5 checksum:    61898 cccd1556f5ee674a2c2f6ddf71522b39
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_ia64.deb
Size/MD5 checksum: 59883340 f6ee758cb0b235682f20e2e22edd870a
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_ia64.deb
Size/MD5 checksum:  2817080 c0adbe387222eedf4d5cf7eff91a4657
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_ia64.deb
Size/MD5 checksum:   204694 8aa8c681d136482bd2cda6563eacbfb9
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_ia64.deb
Size/MD5 checksum: 15783590 960303c76c2be69aad2e4b7bfe4f542e

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_mips.deb
Size/MD5 checksum: 61481346 66bc2a72517409d5334bc0ba40be51fd
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_mips.deb
Size/MD5 checksum:   599404 ff50ca675b598da75eb7f3ab08d34ee6
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_mips.deb
Size/MD5 checksum: 11154048 bd1cb7c5bc7136fd644eb9c87e7181b7
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_mips.deb
Size/MD5 checksum:  1959202 7eb50924f7400d84008edffd0e9d6413
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_mips.deb
Size/MD5 checksum:    49884 80c1be2a4afb6ce7bf9fc785901704dd
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_mips.deb
Size/MD5 checksum:   190950 006169fb68cb210f51fe52090be5050e

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_mipsel.deb
Size/MD5 checksum:    49768 42593decc9887241317c87567f8223b1
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_mipsel.deb
Size/MD5 checksum:   191194 78f3b008208527bf214ed516e85b13f3
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_mipsel.deb
Size/MD5 checksum: 59840612 0118b96a4f8d82286b8d5ccc946b6c0d
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_mipsel.deb
Size/MD5 checksum: 10905670 9874cc963f87d284d927d467eafc8c2f
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_mipsel.deb
Size/MD5 checksum:   595920 3024870501878bf13254165af3ac9686
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_mipsel.deb
Size/MD5 checksum:  1942002 130b8ab791ae8591e22d9635362bf202

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_powerpc.deb
Size/MD5 checksum:    49232 e526eb3de3861503a826593f582f2932
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_powerpc.deb
Size/MD5 checksum:   596206 da0aa1d500d126ef390da42e3b3bc973
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_powerpc.deb
Size/MD5 checksum:   192018 6278d2517e0d32b3e5c42aa2f0010aef
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_powerpc.deb
Size/MD5 checksum: 61613310 b6b25ed7a498f98c3908efb7bd185e0a
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_powerpc.deb
Size/MD5 checksum:  2006468 3253d618628235a609417783309079aa
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_powerpc.deb
Size/MD5 checksum: 11304736 186491b14177328e4cdcc2c0599bee48

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_s390.deb
Size/MD5 checksum:    53962 937cb4b85e25812c189fde886a9ae8b8
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_s390.deb
Size/MD5 checksum:   196854 e838b4c9820b202ba25da00adca529e8
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_s390.deb
Size/MD5 checksum: 12282708 04c09a3bbbe96035301ffa3fa427d2e2
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_s390.deb
Size/MD5 checksum: 60369160 80e463d3e1abe4c6f2e44084c0af1cc6
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_s390.deb
Size/MD5 checksum:   611658 d51e50f35fa7f644e68719bd3c3e1cde
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_s390.deb
Size/MD5 checksum:  2185818 4b702edba4ac2c7e85a22f499250fd40

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_sparc.deb
Size/MD5 checksum:  1895872 2eb1f20b00c11d4f4330016aaa827d55
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_sparc.deb
Size/MD5 checksum: 10652974 8ea3ab5df7323a302c0b9441222fb407
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_sparc.deb
Size/MD5 checksum: 58513948 a455a4a30f354129f5ab3441fcb422af
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_sparc.deb
Size/MD5 checksum:   585296 a57295461949681a7628c2c0aa603ccb
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_sparc.deb
Size/MD5 checksum:    48038 5cba2cf78058d6dd4609cb895961298d
http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_sparc.deb
Size/MD5 checksum:   189644 bdc3c7725fed05757a888de08a4fa959

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

Mozilla
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.mozilla.org/

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2008:0104-01)以及相应补丁:
RHSA-2008:0104-01:Critical: seamonkey security update
链接:https://www.redhat.com/support/errata/RHSA-2008-0104.html
相关文章 热门文章
  • Ipswitch IMail Server邮件列表imailsrv.exe栈溢出漏洞
  • Ipswitch IMail Server imailsrv.exe远程栈溢出漏洞
  • Exim邮件目录硬链接处理本地权限提升漏洞
  • SquirrelMail IMAP登录请求拒绝服务漏洞
  • Microsoft Outlook Online模式远程堆溢出漏洞(MS10-064)
  • IBM Lotus Domino iCalendar邮件地址解析栈溢出漏洞
  • AXIGEN Mail Server远程跨站脚本和目录遍历漏洞
  • Python smtpd模块SMTPChannel类竞争条件拒绝服务漏洞
  • Novell GroupWise Internet Agent组件Content-Type多个值解析栈溢出漏洞
  • Novell GroupWise Internet Agent组件Content-Type字符串解析缓冲区溢出漏洞
  • Microsoft Outlook邮件附件处理拒绝服务漏洞
  • Microsoft Exchange Server 2007无限循环远程拒绝服务漏洞(MS10-106)
  • Exchange Server 2003 中的弱点会导致权限提升
  • 更安全稳定!快下载微软ISA 2000 SP2
  • MDaemon 7.2发现权限提升漏洞
  • Exchange 2003 Server发布新补丁KB883543
  • 微软发布关于Exchange漏洞紧急公告
  • MS05-021:Exchange Server漏洞远程执行代码
  • WebAdmin 3.0.2 跨站脚本、HTML注入安全漏洞
  • Imail Server IMAP EXAMINE命令缓冲区溢出漏洞
  • Open WebMail Email存在头字段HTML代码注入漏洞
  • 微软发布关于Exchange 5.5 漏洞更新公告
  • IMail 8.13远程DELETE命令缓冲区溢出漏洞
  • MS04-035:SMTP中安全漏洞可能允许执行远程代码
  • 自由广告区
     
    最新软件下载
  • SharePoint Server 2010 部署文档
  • Exchange 2010 RTM升级至SP1 教程
  • Exchange 2010 OWA下RBAC实现的组功能...
  • Lync Server 2010 Standard Edition 标..
  • Lync Server 2010 Enterprise Edition...
  • Forefront Endpoint Protection 2010 ...
  • Lync Server 2010 Edge 服务器部署文档
  • 《Exchange 2003专家指南》
  • Mastering Hyper-V Deployment
  • Windows Server 2008 R2 Hyper-V
  • Microsoft Lync Server 2010 Unleashed
  • Windows Server 2008 R2 Unleashed
  • 今日邮件技术文章
  • 腾讯,在创新中演绎互联网“进化论”
  • 华科人 张小龙 (中国第二代程序员 QQ...
  • 微软推出新功能 提高Hotmail密码安全性
  • 快压技巧分享:秒传邮件超大附件
  • 不容忽视的邮件营销数据分析过程中的算..
  • 国内手机邮箱的现状与未来发展——访尚..
  • 易观数据:2011Q2中国手机邮箱市场收入..
  • 穿越时空的爱恋 QQ邮箱音视频及贺卡邮件
  • Hotmail新功能:“我的朋友可能被黑了”
  • 入侵邻居网络发骚扰邮件 美国男子被重..
  • 网易邮箱莫子睿:《非你莫属》招聘多过..
  • 中国电信推广189邮箱绿色账单
  • 最新专题
  • 鸟哥的Linux私房菜之Mail服务器
  • Exchange Server 2010技术专题
  • Windows 7 技术专题
  • Sendmail 邮件系统配置
  • 组建Exchange 2003邮件系统
  • Windows Server 2008 专题
  • ORF 反垃圾邮件系统
  • Exchange Server 2007 专题
  • ISA Server 2006 教程专题
  • Windows Vista 技术专题
  • “黑莓”(BlackBerry)专题
  • Apache James 专题
  • 分类导航
    邮件新闻资讯:
    IT业界 | 邮件服务器 | 邮件趣闻 | 移动电邮
    电子邮箱 | 反垃圾邮件|邮件客户端|网络安全
    行业数据 | 邮件人物 | 网站公告 | 行业法规
    网络技术:
    邮件原理 | 网络协议 | 网络管理 | 传输介质
    线路接入 | 路由接口 | 邮件存储 | 华为3Com
    CISCO技术 | 网络与服务器硬件
    操作系统:
    Windows 9X | Linux&Uinx | Windows NT
    Windows Vista | FreeBSD | 其它操作系统
    邮件服务器:
    程序与开发 | Exchange | Qmail | Postfix
    Sendmail | MDaemon | Domino | Foxmail
    KerioMail | JavaMail | Winwebmail |James
    Merak&VisNetic | CMailServer | WinMail
    金笛邮件系统 | 其它 |
    反垃圾邮件:
    综述| 客户端反垃圾邮件|服务器端反垃圾邮件
    邮件客户端软件:
    Outlook | Foxmail | DreamMail| KooMail
    The bat | 雷鸟 | Eudora |Becky! |Pegasus
    IncrediMail |其它
    电子邮箱: 个人邮箱 | 企业邮箱 |Gmail
    移动电子邮件:服务器 | 客户端 | 技术前沿
    邮件网络安全:
    软件漏洞 | 安全知识 | 病毒公告 |防火墙
    攻防技术 | 病毒查杀| ISA | 数字签名
    邮件营销:
    Email营销 | 网络营销 | 营销技巧 |营销案例
    邮件人才:招聘 | 职场 | 培训 | 指南 | 职场
    解决方案:
    邮件系统|反垃圾邮件 |安全 |移动电邮 |招标
    产品评测:
    邮件系统 |反垃圾邮件 |邮箱 |安全 |客户端
    广告联系 | 合作联系 | 关于我们 | 联系我们 | 繁體中文
    版权所有:邮件技术资讯网©2003-2010 www.5dmail.net, All Rights Reserved
    www.5Dmail.net Web Team   粤ICP备05009143号