Thunderbird 3.1.x < 3.1.20 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a mail client that is potentially
affected by several vulnerabilities.

Description :

The installed version of Thunderbird 3.1.x is potentially affected by
the following security issues :

- Multiple memory corruption issues. By tricking a user
into visiting a specially crafted page, these issues may
allow an attacker to execute arbitrary code in the
context of the affected application. (CVE-2012-0457,
CVE-2012-0461, CVE-2012-0462, CVE-2012-0463,

- A security bypass vulnerability exists that can be
exploited by an attacker if the victim can be tricked
into setting a new home page by dragging a specially
crafted link to the 'home' button URL, which will set
the user's home page to a 'javascript:' URL.

- An information disclosure vulnerability exists due to an
out of bounds read in SVG filters. (CVE-2012-0456)

- A cross-site scripting vulnerability exists that can be
triggered by dragging and dropping 'javascript:' links
onto a frame. (CVE-2012-0455)

See also :

Solution :

Upgrade to Thunderbird 3.1.20 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now