Mandrake Security Advisory MDVSA-2009:216 (mozilla-thunderbird)

Summary
The remote host is missing an update to mozilla-thunderbird announced via advisory MDVSA-2009:216.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:216 http://www.mozilla.org/security/announce/2009/mfsa2009-42.html
Insight
A number of security vulnerabilities have been discovered in the NSS and NSPR libraries and in Mozilla Thunderbird: Security issues in nss prior to 3.12.3 could lead to a man-in-the-middle attack via a spoofed X.509 certificate (CVE-2009-2408) and md2 algorithm flaws (CVE-2009-2409), and also cause a denial-of-service and possible code execution via a long domain name in X.509 certificate (CVE-2009-2404). A vulnerability was found in xmltok_impl.c (expat) that with specially crafted XML could be exploited and lead to a denial of service attack. Related to CVE-2009-2625. This update provides the latest versions of the NSS and NSPR libraries and Thunderbird which are not vulnerable to these issues. Affected: Corporate 3.0