Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities

High Log Correlation Engine Plugin ID 801245

Synopsis

The remote host has a web browser installed that is vulnerable to multiple vulnerabilities.

Description

Versions of Thunderbird less than 17.0.3 are potentially affected by the following security issues :

- Numerous memory safety errors exist. (CVE-2013-0783, CVE-2013-0784)

- An out-of-bounds read error exists related to the handling of GIF images. (CVE-2013-0772)

- An error exists related to 'WebIDL' object wrapping that has an unspecified impact. (CVE-2013-0765

- An error exists related to Chrome Object Wrappers (COW) or System Only Wrappers (SOW) that could allow security bypass. (CVE-2013-0773)

- The file system location of the active browser profile could be disclosed and used in further attacks. (CVE-2013-0774)

- A use-after-free error exists in the function 'nsImageLoadingContent'. (CVE-2013-0775)

- Spoofing HTTPS URLs is possible due to an error related to proxy '407' responses and embedded script code. (CVE-2013-0776)

- A heap-based use-after-free error exists in the function 'nsDisplayBoxShadowOuter::Paint'. (CVE-2013-0777)



- An out-of-bounds read error exists in the function 'ClusterIterator::NextCluster'. (CVE-2013-0778)

- An out-of-bounds read error exists in the function 'nsCodingStateMachine::NextState'. (CVE-2013-0779)

- A heap-based use-after-free error exists in the function 'nsOverflowContinuationTracker::Finish'. (CVE-2013-0780)

- A heap-based use-after-free error exists in the function 'nsPrintEngine::CommonPrint'. (CVE-2013-0781)

- A heap-based buffer overflow error exists in the function 'nsSaveAsCharset::DoCharsetConversion'. (CVE-2013-0782)

Solution

Upgrade to Thunderbird 17.0.3 or later.

See Also

http://www.mozilla.org/security/announce/2012/mfsa2013-21.html

http://www.mozilla.org/security/announce/2012/mfsa2013-22.html

http://www.mozilla.org/security/announce/2012/mfsa2013-23.html

http://www.mozilla.org/security/announce/2012/mfsa2013-24.html

http://www.mozilla.org/security/announce/2012/mfsa2013-25.html

http://www.mozilla.org/security/announce/2012/mfsa2013-26.html

http://www.mozilla.org/security/announce/2012/mfsa2013-27.html

http://www.mozilla.org/security/announce/2012/mfsa2013-28.html

Plugin Details

Severity: High

ID: 801245

File Name: 801245.prm

Family: SMTP Clients

Published: 2013/02/20

Nessus ID: 64724

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 2013/02/19

Vulnerability Publication Date: 2013/02/19

Reference Information

CVE: CVE-2013-0765, CVE-2013-0772, CVE-2013-0773, CVE-2013-0774, CVE-2013-0775, CVE-2013-0776, CVE-2013-0777, CVE-2013-0778, CVE-2013-0779, CVE-2013-0780, CVE-2013-0781, CVE-2013-0782, CVE-2013-0783, CVE-2013-0784

BID: 58034, 58036, 58037, 58038, 58040, 58041, 58042, 58043, 58044, 58047, 58048, 58049, 58050, 58051