icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Mozilla Thunderbird < 2.0.0.24 Multiple Vulnerabilities

High

Synopsis

The remote host contains a mail client that is vulnerable to multiple attack vectors.

Description

The isntalled version of Mozilla Thunderbird is earlier than 2.0.0.24. Such version are potentially affected by multiple vulnerabilities :

- The columns of a XUL tree element can be manipulated in a particular way which would leave a pointer owned by the column pointing to freed memory. (MFSA 2009-49)

- A heap-based buffer overflow exists in Mozilla's string to floating point number conversion routines. (MFSA 2009-59)

- It is possible to obfuscate the name of files to be downloaded by using a right-to-left override character (RTL). (MFSA 2009-62)

Solution

Upgrade to Mozilla Thunderbird 2.0.0.24 or later.