This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing a security update.
A race condition flaw was found in the way Thunderbird handled
Document Object Model (DOM) element properties. An HTML mail message
containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user
running Thunderbird. (CVE-2010-3765)
Several flaws were found in the processing of malformed HTML mail
content. An HTML mail message containing malicious content could cause
Thunderbird to crash or, potentially, execute arbitrary code with the
privileges of the user running Thunderbird. (CVE-2010-3175,
CVE-2010-3176, CVE-2010-3179, CVE-2010-3180, CVE-2010-3183)
A same-origin policy bypass flaw was found in Thunderbird. Remote HTML
content could steal private data from different remote HTML content
Thunderbird had loaded. (CVE-2010-3178)
A flaw was found in the script that launches Thunderbird. The
LD_LIBRARY_PATH variable was appending a '.' character, which could
allow a local attacker to execute arbitrary code with the privileges
of a different user running Thunderbird, if that user ran Thunderbird
from within an attacker-controlled directory. (CVE-2010-3182)
All running instances of Thunderbird must be restarted for the update
to take effect.
See also :
Update the affected thunderbird package.
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60905 ()
CVE ID: CVE-2010-3175CVE-2010-3176CVE-2010-3178CVE-2010-3179CVE-2010-3180CVE-2010-3182CVE-2010-3183CVE-2010-3765
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.