Mozilla Thunderbird < 31.4 Multiple Vulnerabilities

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a mail client that is affected by
multiple vulnerabilities.

Description :

The version of Thunderbird installed on the remote Windows host is
prior to 31.4. It is, therefore, affected by the following
vulnerabilities :

- Multiple unspecified memory safety issues exist within
the browser engine. (CVE-2014-8634, CVE-2014-8635)

- A flaw exists in 'navigator.sendBeacon()' in which it
does not follow the cross-origin resource sharing
specification. This results in requests from
'sendBeacon()' lacking an 'origin' header. This allows
malicious sites to perform XSRF attacks. (CVE-2014-8638)

- A flaw exists when receiving 407 Proxy Authentication
responses with a 'set-cookie' header. This can allow
a session-fixation attack. (CVE-2014-8639)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2015-01/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-03/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-04/

Solution :

Upgrade to Thunderbird 31.4 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.9
(CVSS2#E:U/RL:ND/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 80524 ()

Bugtraq ID: 72046
72047
72049
72050

CVE ID: CVE-2014-8639
CVE-2014-8638
CVE-2014-8634
CVE-2014-8635

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now