Mozilla Thunderbird < 2.0.0.24 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 801216

Synopsis

The remote host contains a mail client that is vulnerable to multiple attack vectors.

Description

The isntalled version of Mozilla Thunderbird is earlier than 2.0.0.24. Such version are potentially affected by multiple vulnerabilities :

- The columns of a XUL tree element can be manipulated in a particular way which would leave a pointer owned by the column pointing to freed memory. (MFSA 2009-49)

- A heap-based buffer overflow exists in Mozilla's string to floating point number conversion routines. (MFSA 2009-59)

- It is possible to obfuscate the name of files to be downloaded by using a right-to-left override character (RTL). (MFSA 2009-62)

Solution

Upgrade to Mozilla Thunderbird 2.0.0.24 or later.

See Also

http://.mozilla.org/security/announce/2009/mfsa2009-59.html

http://.mozilla.org/security/announce/2009/mfsa2009-62.html

http://.mozilla.org/security/announce/2010/mfsa2010-07.html

http://.mozilla.org/security/announce/2009/mfsa2009-49.html

http://.mozilla.org/security/known-vulnerabilities/thunderbird20.html#thunderbird2.0.0.24

Plugin Details

Severity: High

ID: 801216

Family: SMTP Clients

Published: 3/19/2010

Nessus ID: 45110

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

Patch Publication Date: 3/16/2010

Vulnerability Publication Date: 3/18/2010

Reference Information

CVE: CVE-2009-0689, CVE-2009-2463, CVE-2009-3072, CVE-2009-3075, CVE-2009-3077, CVE-2009-3376, CVE-2010-0161, CVE-2010-0163

BID: 38831, 37366