Mozilla Thunderbird < 115.12

medium Nessus Plugin ID 200495

Synopsis

A mail client installed on the remote macOS or Mac OS X host is affected by multiple vulnerabilities.

Description

The version of Thunderbird installed on the remote macOS or Mac OS X host is prior to 115.12. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2024-28 advisory.

- By tricking the browser with a <code>X-Frame-Options</code> header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window.
(CVE-2024-5691)

- Memory corruption in the networking stack could have led to a potentially exploitable crash.
(CVE-2024-5702)

- If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. (CVE-2024-5688)

- By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. (CVE-2024-5690)

- On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as <code>.url</code> by including an invalid character in the extension. Note: This issue only affected Windows operating systems. Other operating systems are unaffected. (CVE-2024-5692)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Mozilla Thunderbird version 115.12 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2024-28/

Plugin Details

Severity: Medium

ID: 200495

File Name: macos_thunderbird_115_12.nasl

Version: 1.9

Type: local

Agent: macosx

Published: 6/13/2024

Updated: 11/20/2025

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2024-5691

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: installed_sw/Mozilla Thunderbird

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/13/2024

Vulnerability Publication Date: 6/11/2024

Reference Information

CVE: CVE-2024-5688, CVE-2024-5690, CVE-2024-5691, CVE-2024-5692, CVE-2024-5693, CVE-2024-5696, CVE-2024-5700, CVE-2024-5702

IAVA: 2024-A-0361-S, 2024-A-0387-S