Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Mozilla Thunderbird < 2.0.0.18 Multiple Vulnerabilities

High

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The installed version of Thunderbird is earlier than 2.0.0.18. Such versions are potentially affected by the following security issues :

- The canvas element can be used in conjunction with an HTTP redirect to bypass same-origin restrictions and gain access to the content in arbitrary images from other domains. (MFSA 2008-48) - By tampering with the window.__proto__.__proto__ object, one can cause the browser to place a lock on a non-native object, leading to a crash and possible code execution. (MFSA 2008-50) - There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption. (MFSA 2008-52) - Crashes and remote code execution in nsFrameManager are possible by modifying certain properties of a file input element before it has finished initializing. (MFSA 2008-55) - The same-origin check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA 2008-56) - There is an error in the method used to parse the default namespace in an E4X document caused by quote characters in the namespace not being properly escaped. (MFSA 2008-58) - Scripts in a malicious mail message can access the .document URI and .textContext DOM properties. (MFSA 2008-59)

Solution

Upgrade to version 2.0.0.18 or higher.