Mozilla Thunderbird < 3.0.5 Multiple Vulnerabilities

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a mail client that is affected by
multiple vulnerabilities.

Description :

The installed version of Thunderbird is earlier than 3.0.5. Such
versions are potentially affected by the following security issues :

- A memory corruption vulnerability can lead to arbitrary
code execution if garbage collection is carefully timed
after DOM nodes are moved between documents.
(MFSA 2010-25)

- Multiple crashes can result in arbitrary code
execution. (MFSA 2010-26)

- An error in 'nsGenericDOMDataNode' allows a buffer
overflow in certain DOM nodes leading to arbitrary code
execution. (MFSA 2010-29)

- An error in a XSLT node sorting function contains an
integer overflow leading to application crashes and
possible arbitrary code execution. (MFSA 2010-30)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2010-25/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-26/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-29/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-30/

Solution :

Upgrade to Thunderbird 3.0.5 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 47125 ()

Bugtraq ID: 38952
41082
41087

CVE ID: CVE-2010-1121
CVE-2010-1196
CVE-2010-1199

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now