Mozilla Thunderbird < Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness

Medium Nessus Plugin ID 40664


The remote Windows host contains a mail client that is affected by a security bypass vulnerability.


The installed version of Thunderbird is earlier than Such versions are potentially affected by the following security issue :

- The client can be fooled into trusting a malicious SSL server certificate with a null character in the host name.
(MFSA 2009-42)


Upgrade to Thunderbird or later.

See Also

Plugin Details

Severity: Medium

ID: 40664

File Name: mozilla_thunderbird_20023.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2009/08/21

Modified: 2017/06/09

Dependencies: 20862

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/08/20

Vulnerability Publication Date: 2009/07/30

Reference Information

CVE: CVE-2009-2408

BID: 35888

OSVDB: 56723

Secunia: 36088

CWE: 310