This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.
The remote Mac OS X host contains a mail client that is potentially
affected by several vulnerabilities.
The installed version of Thunderbird 3.1.x is potentially affected by
the following security issues :
- Multiple memory corruption issues. By tricking a user
into visiting a specially crafted page, these issues may
allow an attacker to execute arbitrary code in the
context of the affected application. (CVE-2012-0457,
CVE-2012-0461, CVE-2012-0462, CVE-2012-0463,
- A security bypass vulnerability exists that can be
exploited by an attacker if the victim can be tricked
into setting a new home page by dragging a specially
crafted link to the 'home' button URL, which will set
- An information disclosure vulnerability exists due to an
out of bounds read in SVG filters. (CVE-2012-0456)
- A cross-site scripting vulnerability exists that can be
onto a frame. (CVE-2012-0455)
See also :
Upgrade to Thunderbird 3.1.20 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false