Mozilla Thunderbird 24.x < 24.7 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a mail client that is affected by
multiple vulnerabilities.

Description :

The version of Thunderbird 24.x installed on the remote host is a version
prior to 24.7. It is, therefore, affected by the following
vulnerabilities :

- When a pair of NSSCertificate structures are added to a
trust domain and then one of them is removed during use,
a use-after-free error occurs which may cause the
application to crash. This crash is potentially
exploitable. (CVE-2014-1544)

- There are multiple memory safety hazards within the
browser engine. These hazards may lead to memory
corruption vulnerabilities, which may allow attackers
to execute arbitrary code. (CVE-2014-1547,

- Triggering the FireOnStateChange event has the
potential to crash the application. This may lead to
a use-after-free and an exploitable crash.

- When using the Cesium JavaScript library to generate
WebGL content, the application may crash. This crash
is potentially exploitable. (CVE-2014-1556)

- There is a flaw in the Skia library when scaling images
of high quality. If the image data is discarded while
being processed, the library may crash. This crash
is potentially exploitable. (CVE-2014-1557)

See also :

Solution :

Upgrade to Thunderbird 24.7 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 76760 ()

Bugtraq ID: 68811

CVE ID: CVE-2014-1544

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now