Mozilla Thunderbird < 2.0.0.21 Multiple Vulnerabilities

High Nessus Plugin ID 35977

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The installed version of Thunderbird is earlier than 2.0.0.21. Such versions are potentially affected by the following security issues :

- There are several stability bugs in the browser engine that could lead to crashes with evidence of memory corruption. (MFSA 2009-01)

- By exploiting stability bugs in the browser engine, it might be possible for an attacker to execute arbitrary code on the remote system under certain conditions. (MFSA 2009-07)

- It might be possible for a website to read arbitrary XML data from another domain by using nsIRDFService and a cross-domain redirect. (MFSA 2009-09)

- Vulnerabilities in the PNG libraries used by Mozilla could be exploited to execute arbitrary code on the remote system. (MFSA 2009-10)

- A URI-spoofing vulnerability exists because the application fails to adequately handle specific characters in IDN subdomains. (MFSA 2009-15)

Solution

Upgrade to Mozilla Thunderbird 2.0.0.21 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2009-01/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-07/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-09/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-10/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-15/

http://www.nessus.org/u?ec5c5621

Plugin Details

Severity: High

ID: 35977

File Name: mozilla_thunderbird_20021.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 2009/03/20

Updated: 2018/11/15

Dependencies: 20862

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/02/03

Reference Information

CVE: CVE-2009-0040, CVE-2009-0352, CVE-2009-0353, CVE-2009-0652, CVE-2009-0771, CVE-2009-0772, CVE-2009-0773, CVE-2009-0774, CVE-2009-0776

BID: 33598, 33827, 33837, 33990

CWE: 94, 200, 399