Mozilla Thunderbird < 2.0.0.17 Multiple Vulnerabilities

High Log Correlation Engine Plugin ID 801289

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The installed version of Thunderbird is affected by various security issues :

- Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be able to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute arbitrary code (MFSA 2008-37).
- It is possible to bypass the same-origin check in 'nsXMLDocument::OnChannelRedirect()' (MFSA 2008-38).
- Privilege escalation is possible via 'XPCnativeWrapper' pollution (MFSA 2008-41).
- There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption (MFSA 2008-42).
- Certain BOM characters and low surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is executed, which could allow for cross-site scripting attacks (MFSA 2008-43).
- The 'resource:' protocol allows directory traversal on Linux when using URL-encoded slashes, and it can by used to bypass restrictions on local HTML files (MFSA 2008-44).
- There is a heap buffer overflow that can be triggered when canceling a newsgroup message (MFSA 2008-46).

Solution

Upgrade to version 2.0.0.17 or higher.

See Also

http://.mozilla.org/security/announce/2008/mfsa2008-37.html

http://.mozilla.org/security/announce/2008/mfsa2008-38.html

http://.mozilla.org/security/announce/2008/mfsa2008-41.html

http://.mozilla.org/security/announce/2008/mfsa2008-42.html

http://.mozilla.org/security/announce/2008/mfsa2008-43.html

http://.mozilla.org/security/announce/2008/mfsa2008-44.html

http://.mozilla.org/security/announce/2008/mfsa2008-46.html

http://.securityfocus.com/bid/31346

Plugin Details

Severity: High

ID: 801289

File Name: 801289.prm

Family: SMTP Clients

Nessus ID: 34294

Risk Information

Risk Factor: High

CVSSv2

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2008-0016, CVE-2008-3835, CVE-2008-3836, CVE-2008-3837, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064, CVE-2008-4065, CVE-2008-4066, CVE-2008-4067, CVE-2008-4068, CVE-2008-4069, CVE-2008-4070

BID: 31346, 31411