Mozilla Thunderbird < Multiple Vulnerabilities

high Nessus Plugin ID 31193


The remote Windows host contains a mail client that is affected by multiple vulnerabilities.


The installed version of Thunderbird is affected by various security issues :

- Several stability bugs exist leading to crashes which, in some cases, show traces of memory corruption.

- Several issues exist that allow scripts from page content to escape from their sandboxed context and/or run with chrome privileges, resulting in privilege escalation, cross-site scripting, and/or remote code execution.

- A directory traversal vulnerability exist via the 'chrome:' URI.

- A heap-based buffer overflow exists that can be triggered when viewing an email with an external MIME body.

- Multiple cross-site scripting vulnerabilities exist related to character encoding.


Upgrade to Mozilla Thunderbird or later.

See Also

Plugin Details

Severity: High

ID: 31193

File Name: mozilla_thunderbird_20012.nasl

Version: 1.23

Type: local

Agent: windows

Family: Windows

Published: 2/27/2008

Updated: 7/16/2018

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/7/2008

Reference Information

CVE: CVE-2008-0304, CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0416, CVE-2008-0418

BID: 27406, 27683, 28012, 29303

CWE: 119, 22, 399, 79