Mozilla Thunderbird < 2.0.0.24 Multiple Vulnerabilities

High Log Correlation Engine Plugin ID 801216

Synopsis

The remote host contains a mail client that is vulnerable to multiple attack vectors.

Description

The isntalled version of Mozilla Thunderbird is earlier than 2.0.0.24. Such version are potentially affected by multiple vulnerabilities :

- The columns of a XUL tree element can be manipulated in a particular way which would leave a pointer owned by the column pointing to freed memory. (MFSA 2009-49)

- A heap-based buffer overflow exists in Mozilla's string to floating point number conversion routines. (MFSA 2009-59)

- It is possible to obfuscate the name of files to be downloaded by using a right-to-left override character (RTL). (MFSA 2009-62)

Solution

Upgrade to Mozilla Thunderbird 2.0.0.24 or later.

See Also

http://.mozilla.org/security/announce/2010/mfsa2010-07.html

http://.mozilla.org/security/announce/2009/mfsa2009-62.html

http://.mozilla.org/security/announce/2009/mfsa2009-59.html

http://.mozilla.org/security/announce/2009/mfsa2009-49.html

http://.mozilla.org/security/known-vulnerabilities/thunderbird20.html#thunderbird2.0.0.24

Plugin Details

Severity: High

ID: 801216

File Name: 801216.prm

Family: SMTP Clients

Published: 2010/03/19

Nessus ID: 45110

Risk Information

Risk Factor: High

CVSSv2

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 2010/03/16

Vulnerability Publication Date: 2010/03/18

Reference Information

CVE: CVE-2009-0689, CVE-2009-2463, CVE-2009-3072, CVE-2009-3075, CVE-2009-3077, CVE-2009-3376, CVE-2010-0161, CVE-2010-0163

BID: 37366, 38831