Mozilla Thunderbird < 2.0.0.23 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness

Medium Nessus Plugin ID 40664

Synopsis

The remote Windows host contains a mail client that is affected by a security bypass vulnerability.

Description

The installed version of Thunderbird is earlier than 2.0.0.23. Such versions are potentially affected by the following security issue :

- The client can be fooled into trusting a malicious SSL server certificate with a null character in the host name.
(MFSA 2009-42)

Solution

Upgrade to Thunderbird 2.0.0.23 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2009-42/

Plugin Details

Severity: Medium

ID: 40664

File Name: mozilla_thunderbird_20023.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 2009/08/21

Updated: 2018/07/16

Dependencies: 20862

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/08/20

Vulnerability Publication Date: 2009/07/30

Reference Information

CVE: CVE-2009-2408

BID: 35888

Secunia: 36088

CWE: 310