Thunderbird 10.x < 10.0.10 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a mail client that is potentially
affected by several vulnerabilities.

Description :

The installed version of Thunderbird 10.x is potentially affected by
the following security issues :

- The true value of 'window.location' can be shadowed by
user content through the use of the 'valueOf' method,
which can be combined with some plugins to perform
cross-site scripting attacks. (CVE-2012-4194)

- The 'CheckURL' function of 'window.location' can be
forced to return the wrong calling document and
principal, allowing a cross-site scripting attack.

- It is possible to use property injection by prototype to
bypass security wrapper protections on the 'Location'
object, allowing the cross-origin reading of the
'Location' object. (CVE-2012-4196)

See also :

Solution :

Upgrade to Thunderbird 10.0.10 ESR or later.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 62741 ()

Bugtraq ID: 56301

CVE ID: CVE-2012-4194