Oracle Solaris Third-Party Patch Update : thunderbird (multiple_vulnerabilities_in_thunderbird2)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- Cross-site scripting (XSS) vulnerability in Mozilla
Firefox before 3.6.24 and 4.x through 7.0 and
Thunderbird before 3.1.6 and 5.0 through 7.0 allows
remote attackers to inject arbitrary web script or HTML
via crafted text with Shift JIS encoding.
(CVE-2011-3648)

- Mozilla Firefox before 3.6.24 and 4.x through 7.0 and
Thunderbird before 3.1.6 and 5.0 through 7.0 do not
properly handle JavaScript files that contain many
functions, which allows user-assisted remote attackers
to cause a denial of service (memory corruption and
application crash) or possibly have unspecified other
impact via a crafted file that is accessed by debugging
APIs, as demonstrated by Firebug. (CVE-2011-3650)

- Multiple unspecified vulnerabilities in the browser
engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow
remote attackers to cause a denial of service (memory
corruption and application crash) or possibly execute
arbitrary code via unknown vectors. (CVE-2011-3651)

- The browser engine in Mozilla Firefox before 8.0 and
Thunderbird before 8.0 does not properly allocate
memory, which allows remote attackers to cause a denial
of service (memory corruption and application crash) or
possibly execute arbitrary code via unspecified vectors.
(CVE-2011-3652)

- The browser engine in Mozilla Firefox before 8.0 and
Thunderbird before 8.0 does not properly handle links
from SVG mpath elements to non-SVG elements, which
allows remote attackers to cause a denial of service
(memory corruption and application crash) or possibly
execute arbitrary code via unspecified vectors.
(CVE-2011-3654)

- Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0
through 7.0 perform access control without checking for
use of the NoWaiverWrapper wrapper, which allows remote
attackers to gain privileges via a crafted web site.
(CVE-2011-3655)

See also :

http://www.nessus.org/u?b5f8def1
http://www.nessus.org/u?076cacd9

Solution :

Upgrade to Solaris 11/11 SRU 04.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80783 ()

Bugtraq ID:

CVE ID: CVE-2011-3648
CVE-2011-3650
CVE-2011-3651
CVE-2011-3652
CVE-2011-3654
CVE-2011-3655

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now