Mozilla Thunderbird 17.x < 17.0.5 Multiple Vulnerabilities

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a mail client that is potentially
affected by multiple vulnerabilities.

Description :

The installed version of Thunderbird 17.x is a version prior to
17.0.5 and is, therefore, potentially affected by the following
vulnerabilities :

- Various memory safety issues exist. (CVE-2013-0801)

- It is possible to call a content level constructor that
allows for the constructor to have chrome privileged
access. (CVE-2013-1670)

- A local privilege escalation issues exists in the
Mozilla Maintenance Service. (CVE-2013-1672)

- A use-after-free vulnerability exists when resizing
video while playing. (CVE-2013-1674)

- Some 'DOMSVGZoomEvent' functions are used without being
properly initialized, which could lead to information
disclosure. (CVE-2013-1675)

- Multiple memory corruption issues exist. (CVE-2013-1676,
CVE-2013-1677, CVE-2013-1678, CVE-2013-1679,
CVE-2013-1680, CVE-2013-1681)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2013-41/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-42/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-44/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-46/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-47/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-48/

Solution :

Upgrade to Thunderbird 17.0.6 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now