Mozilla Thunderbird < 2.0.0.18 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 801316

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The installed version of Thunderbird is earlier than 2.0.0.18. Such versions are potentially affected by the following security issues :


- The canvas element can be used in conjunction with an HTTP redirect to bypass same-origin restrictions and gain access to the content in arbitrary images from other domains. (MFSA 2008-48)
- By tampering with the window.__proto__.__proto__ object, one can cause the browser to place a lock on a non-native object, leading to a crash and possible code execution. (MFSA 2008-50)
- There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption. (MFSA 2008-52)
- Crashes and remote code execution in nsFrameManager are possible by modifying certain properties of a file input element before it has finished initializing. (MFSA 2008-55)
- The same-origin check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA 2008-56)
- There is an error in the method used to parse the default namespace in an E4X document caused by quote characters in the namespace not being properly escaped. (MFSA 2008-58)
- Scripts in a malicious mail message can access the .document URI and .textContext DOM properties. (MFSA 2008-59)

Solution

Upgrade to version 2.0.0.18 or higher.

See Also

http://.mozilla.org/security/announce/2008/mfsa2008-48.html

http://.mozilla.org/security/announce/2008/mfsa2008-50.html

http://.mozilla.org/security/announce/2008/mfsa2008-52.html

http://.mozilla.org/security/announce/2008/mfsa2008-55.html

http://.mozilla.org/security/announce/2008/mfsa2008-56.html

http://.mozilla.org/security/announce/2008/mfsa2008-58.html

http://.mozilla.org/security/announce/2008/mfsa2008-59.html

http://.securityfocus.com/bid/32281