Mozilla Thunderbird < 24.3 Multiple Vulnerabilities
PVS ID: 8100 FAMILY: SMTP Clients RISK: MEDIUM NESSUS ID:72331
Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple attack vectors.\n\nVersions of Mozilla Thunderbird earlier than 24.3 are prone to the following vulnerabilities:\n\n - Memory issues exist in the browser engine that could result in a denial of service or arbitrary code execution. (CVE-2014-1477, CVE-2014-1478)\n\n - An error exists related to System Only Wrappers (SOW) and the XML Binding Language (XBL) that could allow XUL content to be disclosed. (CVE-2014-1479)\n\n - An error exists related to the JavaScript engine and 'window' object handling that has unspecified impact. (CVE-2014-1481)\n\n - An error exists related to 'RasterImage' and image decoding that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1482)\n\n - A use-after-free error exists related to image handling and 'imgRequestProxy' that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1486)\n\n - An error exists related to 'web workers' that could allow cross-origin information disclosure. (CVE-2014-1487)\n\n - Errors exist related to the included Network Security Services (NSS) libraries, 'NewSessionTicket' handshakes and public Diffie-Hellman values that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1490, CVE-2014-1491)\n\nThe detected version from the remote host was :\n %L

Solution: Upgrade to Thunderbird 24.3, or later.

CVE-2014-1491


Copyright Tenable Network Security Inc. 2014