Mozilla Thunderbird < 31.6 Multiple Vulnerabilities

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a mail client that is affected by
multiple vulnerabilities.

Description :

The version of Thunderbird installed on the remote Windows host is
prior to 31.6. It is, therefore, affected by the following
vulnerabilities :

- A privilege escalation vulnerability exists which
relates to anchor navigation. A remote attacker can
exploit this to bypass same-origin policy protections,
allowing a possible execution of arbitrary scripts in a
privileged context. (CVE-2015-0801)

- Access to certain privileged internal methods is
retained when navigating from windows created to contain
privileged UI content to unprivileged pages. An attacker
can exploit this to execute arbitrary JavaScript with
elevated privileges. (CVE-2015-0802)

- A cross-site request forgery (XSRF) vulnerability exists
in the sendBeacon() function due to cross-origin
resource sharing (CORS) requests following 30x
redirections. (CVE-2015-0807)

- Multiple memory safety issues exist within the browser
engine. A remote attacker can exploit these to corrupt
memory and possibly execute arbitrary code.
(CVE-2015-0815)

- A privilege escalation vulnerability exists related to
documents loaded through a 'resource:' URL. An attacker
can exploit this to load pages and execute JavaScript
with elevated privileges. (CVE-2015-0816)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2015-30/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-33/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-37/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-40/

Solution :

Upgrade to Thunderbird 31.6 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 82504 ()

Bugtraq ID: 73454
73455
73457
73461
73466

CVE ID: CVE-2015-0801
CVE-2015-0802
CVE-2015-0807
CVE-2015-0815
CVE-2015-0816

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now