Mozilla Thunderbird < 2.0.0.23 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a mail client that is affected by a
security bypass vulnerability.

Description :

The installed version of Thunderbird is earlier than 2.0.0.23. Such
versions are potentially affected by the following security issue :

- The client can be fooled into trusting a malicious SSL
server certificate with a null character in the host name.
(MFSA 2009-42)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2009-42/

Solution :

Upgrade to Thunderbird 2.0.0.23 or later.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 40664 ()

Bugtraq ID: 35888

CVE ID: CVE-2009-2408

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now