Mozilla Thunderbird < Multiple Vulnerabilities

High Nessus Plugin ID 31193


The remote Windows host contains a mail client that is affected by multiple vulnerabilities.


The installed version of Thunderbird is affected by various security issues :

- Several stability bugs exist leading to crashes which, in some cases, show traces of memory corruption.

- Several issues exist that allow scripts from page content to escape from their sandboxed context and/or run with chrome privileges, resulting in privilege escalation, cross-site scripting, and/or remote code execution.

- A directory traversal vulnerability exist via the 'chrome:' URI.

- A heap-based buffer overflow exists that can be triggered when viewing an email with an external MIME body.

- Multiple cross-site scripting vulnerabilities exist related to character encoding.


Upgrade to Mozilla Thunderbird or later.

See Also

Plugin Details

Severity: High

ID: 31193

File Name: mozilla_thunderbird_20012.nasl

Version: $Revision: 1.22 $

Type: local

Agent: windows

Family: Windows

Published: 2008/02/27

Modified: 2017/06/09

Dependencies: 20862

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/02/07

Reference Information

CVE: CVE-2008-0304, CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0416, CVE-2008-0418

BID: 27406, 27683, 28012, 29303

OSVDB: 41187, 41220, 41222, 41223, 42056, 42428, 43456, 43457, 43458, 43459, 43460, 43461, 43462

CWE: 22, 79, 119, 399