Mozilla Thunderbird < 60.7.2

critical Nessus Plugin ID 126218

Synopsis

A mail client installed on the remote Windows host is affected by multiple vulnerabilities.

Description

The version of Thunderbird installed on the remote Windows host is prior to 60.7.2. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-20 advisory.

- Insufficient vetting of parameters passed with the <code>Prompt:Open</code> IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. (CVE-2019-11708)

- A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in <code>Array.pop</code>. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. (CVE-2019-11707)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Mozilla Thunderbird version 60.7.2 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/

Plugin Details

Severity: Critical

ID: 126218

File Name: mozilla_thunderbird_60_7_2.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 6/25/2019

Updated: 11/18/2025

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-11708

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: installed_sw/Mozilla Thunderbird

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/20/2019

Vulnerability Publication Date: 6/20/2019

CISA Known Exploited Vulnerability Due Dates: 6/13/2022

Reference Information

CVE: CVE-2019-11707, CVE-2019-11708

BID: 108810, 108835

MFSA: 2019-20