Thunderbird < 16.0.2 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a mail client that is potentially
affected by several vulnerabilities.

Description :

The installed version of Thunderbird is earlier than 16.0.2 and is
therefore potentially affected by the following security issues :

- The true value of 'window.location' can be shadowed by
user content through the use of the 'valueOf' method,
which can be combined with some plugins to perform
cross-site scripting attacks. (CVE-2012-4194)

- The 'CheckURL' function of 'window.location' can be
forced to return the wrong calling document and
principal, allowing a cross-site scripting attack.

- It is possible to use property injection by prototype to
bypass security wrapper protections on the 'Location'
object, allowing the cross-origin reading of the
'Location' object. (CVE-2012-4196)

See also :

Solution :

Upgrade to Thunderbird 16.0.2 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 62742 ()

Bugtraq ID: 56301

CVE ID: CVE-2012-4194

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now