Mozilla Thunderbird < 17.0.8 Multiple Vulnerabilities

medium Log Correlation Engine Plugin ID 801464
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Mozilla Firefox earlier than version 23.0 are prone to the following vulnerabilities:

- Multiple memory-corruption vulnerabilities exist in the browser engine that could lead to arbitrary code execution. (CVE-2013-1701, CVE-2013-1702)

- Multiple stack-based buffer overflow vulnerabilities occur in both the Maintenance Service and the Mozilla Updater when unexpectedly long paths were encountered. (CVE-2013-1706, CVE-2013-1707)

- A cross-site scripting vulnerability affects the application. An attacker can exploit this issue through an interaction of frames and browser history. (CVE-2013-1709)

- A remote code execution and cross-site scripting vulnerability occurs when generating a Certificate Request Message Format (CRMF) request. (CVE-2013-1710)

- A privilege-escalation vulnerability occurs due to an error when using Mozilla Updater. An attacker can exploit this issue to load a specific malicious DLL file from the local system using the Mozilla Updater, and can able to execute the DLL in a privileged context through the Mozilla Maintenance Service's privileges. (CVE-2013-1712)

- A same-origin security-bypass vulnerability exists because wrong principal is used for validating URI for some Javascript components. (CVE-2013-1713)

- A same-origin security-bypass vulnerability occurs due to an error with web workers and XMLHttpRequest. (CVE-2013-1714)

- An information-disclosure vulnerability occurs due to an unspecified error with Java applets. This issue leads to disclose contents of local file system when loaded using the a 'file:/// URI'. (CVE-2013-1717)

Solution

Upgrade to Thunderbird 17.0.8 or later.

See Also

http://.mozilla.org/security/announce/2013/mfsa2013-63.html

http://.mozilla.org/security/announce/2013/mfsa2013-66.html

http://.mozilla.org/security/announce/2013/mfsa2013-68.html

http://.mozilla.org/security/announce/2013/mfsa2013-69.html

http://.mozilla.org/security/announce/2013/mfsa2013-71.html

http://.mozilla.org/security/announce/2013/mfsa2013-72.html

http://.mozilla.org/security/announce/2013/mfsa2013-73.html

http://.mozilla.org/security/announce/2013/mfsa2013-75.html

Plugin Details

Severity: Medium

ID: 801464

Family: Web Clients

Published: 8/8/2013

Updated: 8/8/2013

Nessus ID: 69234

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 8/6/2012

Vulnerability Publication Date: 8/6/2012

Reference Information

CVE: CVE-2013-1701, CVE-2013-1709, CVE-2013-1710, CVE-2013-1713, CVE-2013-1714, CVE-2013-1717, CVE-2013-1702, CVE-2013-1707, CVE-2013-1706, CVE-2013-1712

BID: 61641