Mozilla Thunderbird < 126.96.36.199 Multiple Vulnerabilities
High Log Correlation Engine Plugin ID 801316
The remote Windows host contains a mail client that is affected by multiple vulnerabilities.
The installed version of Thunderbird is earlier than 188.8.131.52. Such versions are potentially affected by the following security issues : - The canvas element can be used in conjunction with an HTTP redirect to bypass same-origin restrictions and gain access to the content in arbitrary images from other domains. (MFSA 2008-48) - By tampering with the window.__proto__.__proto__ object, one can cause the browser to place a lock on a non-native object, leading to a crash and possible code execution. (MFSA 2008-50) - There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption. (MFSA 2008-52) - Crashes and remote code execution in nsFrameManager are possible by modifying certain properties of a file input element before it has finished initializing. (MFSA 2008-55) - The same-origin check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA 2008-56) - There is an error in the method used to parse the default namespace in an E4X document caused by quote characters in the namespace not being properly escaped. (MFSA 2008-58) - Scripts in a malicious mail message can access the .document URI and .textContext DOM properties. (MFSA 2008-59)