Thunderbird 10.0.x < 10.0.3 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a mail client that is potentially
affected by several vulnerabilities.

Description :

The installed version of Thunderbird 10.0.x is potentially affected
by the following security issues :

- Multiple memory corruption issues. By tricking a user
into visiting a specially crafted page, these issues may
allow an attacker to execute arbitrary code in the
context of the affected application. (CVE-2012-0454,
CVE-2012-0457, CVE-2012-0459, CVE-2012-0461,
CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)

- An HTTP Header security bypass vulnerability exists that
can be leveraged by attackers to bypass certain security
restrictions and conduct cross-site scripting attacks.

- A security bypass vulnerability exists that can be
exploited by an attacker if the victim can be tricked
into setting a new home page by dragging a specially
crafted link to the 'home' button URL, which will set
the user's home page to a 'javascript:' URL.

- An information disclosure vulnerability exists due to an
out-of-bounds read in SVG filters. (CVE-2012-0456)

- A cross-site scripting vulnerability exists that can be
triggered by dragging and dropping 'javascript:' links
onto a frame. (CVE-2012-0455)

- 'window.fullScreen' is writeable by untrusted content,
allowing attackers to perform UI spoofing attacks.

See also :

Solution :

Upgrade to Thunderbird 10.0.3 ESR or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now