icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities

Medium

Synopsis

The remote host has a mail client installed that is vulnerable to multiple vulnerabilities

Description

Versions earlier than Thunderbird 16.0.2 are potentially affected by the following security issues :

- The true value of 'window.location' can be shadowed by user content through the use of the 'valueOf' method, which can be combined with some plugins to perform cross-site scripting attacks. (CVE-2012-4194)

- The 'CheckURL' function of 'window.location' can be forced to return the wrong calling document and principal, allowing a cross-site scripting attack. (CVE-2012-4195)

- It is possible to use property injection by prototype to bypass security wrapper protections on the 'Location' object, allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)

Solution

Upgrade to Thunderbird 16.0.2 or later.