Mozilla Thunderbird < 60.7.2

critical Nessus Plugin ID 126218

Synopsis

A mail client installed on the remote Windows host is affected by multiple vulnerabilities.

Description

The version of Thunderbird installed on the remote Windows host is prior to 60.7.2. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-20 advisory.

- A denial of service (DoS) vulnerability exists in the Arrays.pop component due to a type confusion vulnerability. An unauthenticated, remote attacker can exploit this issue, by manipulating JavaScript objects, to cause the application to stop responding (CVE-2019-11707).

- A remote command execution vulnerability exists in Thunderbird's Prompt:Open IPC component due to insufficient validation of user-supplied data. An unauthenticated, remote attacker can exploit this to escape a child process' sandbox and execute arbitrary commands with the priviliges of the user running the main Thunderbird process (CVE-2019-11708).

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Mozilla Thunderbird version 60.7.2 or later.

See Also

http://www.nessus.org/u?a74ea67b

Plugin Details

Severity: Critical

ID: 126218

File Name: mozilla_thunderbird_60_7_2.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 6/25/2019

Updated: 4/25/2023

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-11708

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/20/2019

Vulnerability Publication Date: 6/20/2019

CISA Known Exploited Vulnerability Due Dates: 6/13/2022

Reference Information

CVE: CVE-2019-11707, CVE-2019-11708

BID: 108810, 108835

MFSA: 2019-20