Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a mail client that is potentially
affected by several vulnerabilities.

Description :

The installed version of Thunderbird 10.x is potentially affected by
the following security issues :

- Two intermediate certificates were improperly issued by
TURKTRUST certificate authority. (CVE-2013-0743)

- A use-after-free error exists related to displaying
HTML tables with many columns and column groups.
(CVE-2013-0744)

- An error exists related to 'jsval', 'quickstubs', and
compartmental mismatches that could lead to potentially
exploitable crashes. (CVE-2013-0746)

- An error related to the 'toString' method of XBL
objects could lead to address information leakage.
(CVE-2013-0748)

- A buffer overflow exists related to JavaScript string
concatenation. (CVE-2013-0750)

- A use-after-free error exists related to
'XMLSerializer' and 'serializeToStream'.
(CVE-2013-0753)

- A use-after-free error exists related to garbage
collection and 'ListenManager'. (CVE-2013-0754)

- An error related to SVG elements and plugins could
allow privilege escalation. (CVE-2013-0758)

- An error exists related to the address bar that could
allow URL spoofing attacks. (CVE-2013-0759)

- Multiple, unspecified use-after-free, out-of-bounds read
and buffer overflow errors exist. (CVE-2013-0762,
CVE-2013-0766, CVE-2013-0767)

- An unspecified memory corruption issue exists.
(CVE-2013-0769)

Please note the 10.x ESR branch will no longer be supported as of
02/13/2013. Only the 17.x ESR branch will receive security updates
after that date.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-13-003/
http://www.zerodayinitiative.com/advisories/ZDI-13-006/
http://www.zerodayinitiative.com/advisories/ZDI-13-039/
http://www.mozilla.org/security/announce/2013/mfsa2013-01.html
http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
http://www.mozilla.org/security/announce/2013/mfsa2013-04.html
http://www.mozilla.org/security/announce/2013/mfsa2013-05.html
http://www.mozilla.org/security/announce/2013/mfsa2013-09.html
http://www.mozilla.org/security/announce/2013/mfsa2013-11.html
http://www.mozilla.org/security/announce/2013/mfsa2013-12.html
http://www.mozilla.org/security/announce/2013/mfsa2013-15.html
http://www.mozilla.org/security/announce/2013/mfsa2013-16.html
http://www.mozilla.org/security/announce/2013/mfsa2013-17.html
http://www.mozilla.org/security/announce/2013/mfsa2013-20.html

Solution :

Upgrade to Thunderbird 10.0.12 ESR or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true