The remote host is vulnerable to a buffer overflow.
The remote host is running a vulnerable version of Mozilla Thunderbird mail client. It is reported that this version of Mozilla or Mozilla Thunderbird is vulnerable to a flaw where embedded HTML tagging allows a remote attacker to spoof the 'Save as' dialog box and convince an unsuspecting user in download a malicious file. An attacker exploiting this flaw would need to be able to convince a remote user to click on a malicious link. Successful exploitation would result in malicious code being downloaded onto the client machine. Secondly, The remote version of this software is vulnerable to a heap overflow vulnerability when it processes GIF images. An attacker may exploit this flaw to execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a malformed GIF image to a victim on the remote host and wait for him or her to open it.
Upgrade to version 1.0.2 or higher.