This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote Oracle Linux host is missing a security update.
From Red Hat Security Advisory 2008:0908 :
Updated thunderbird packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
Mozilla Thunderbird is a standalone mail and newsgroup client.
Several flaws were found in the processing of malformed HTML mail
content. An HTML mail message containing malicious content could cause
Thunderbird to crash or, potentially, execute arbitrary code as the
user running Thunderbird. (CVE-2008-0016, CVE-2008-4058,
CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062)
Several flaws were found in the way malformed HTML mail content was
displayed. An HTML mail message containing specially crafted content
could potentially trick a Thunderbird user into surrendering sensitive
information. (CVE-2008-3835, CVE-2008-4067, CVE-2008-4068)
A flaw was found in Thunderbird that caused certain characters to be
A heap based buffer overflow flaw was found in the handling of
cancelled newsgroup messages. If the user cancels a specially crafted
newsgroup message it could cause Thunderbird to crash or, potentially,
execute arbitrary code as the user running Thunderbird.
All Thunderbird users should upgrade to these updated packages, which
resolve these issues.
See also :
Update the affected thunderbird package.
Risk factor :
Critical / CVSS Base Score : 10.0
Public Exploit Available : true
Family: Oracle Linux Local Security Checks
Nessus Plugin ID: 67754 ()
CVE ID: CVE-2008-0016CVE-2008-3835CVE-2008-4058CVE-2008-4059CVE-2008-4060CVE-2008-4061CVE-2008-4062CVE-2008-4065CVE-2008-4066CVE-2008-4067CVE-2008-4068CVE-2008-4070
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.