This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
Mozilla Thunderbird is a standalone mail and newsgroup client. Several
flaws were found in the way Thunderbird processed certain malformed
HTML mail content. A HTML mail message containing malicious content
could cause Thunderbird to crash, or potentially execute arbitrary
code as the user running Thunderbird. (CVE-2008-0412, CVE-2008-0413,
CVE-2008-0415, CVE-2008-0419) Several flaws were found in the way
Thunderbird displayed malformed HTML mail content. A HTML mail message
containing specially crafted content could trick a user into
surrendering sensitive information. (CVE-2008-0591, CVE-2008-0593) A
flaw was found in the way Thunderbird handles certain chrome URLs. If
a user has certain extensions installed, it could allow a malicious
HTML mail message to steal sensitive session data. Note: this flaw
does not affect a default installation of Thunderbird. (CVE-2008-0418)
was found in the way Thunderbird saves certain text files. If a remote
site offers a file of type 'plain/text', rather than 'text/plain',
Thunderbird will not show future 'text/plain' content to the user,
forcing them to save those files locally to view the content.
(CVE-2008-0592) Users of thunderbird are advised to upgrade to these
updated packages, which contain backported patches to resolve these
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected thunderbird package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true
Family: Fedora Local Security Checks
Nessus Plugin ID: 31314 (fedora_2008-2060.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now