Mozilla Thunderbird < Multiple Vulnerabilities

High Nessus Plugin ID 45110


The remote Windows host contains a mail client that is affected by multiple vulnerabilities.


The installed version of Thunderbird is earlier than Such versions are potentially affected by multiple vulnerabilities :

- The columns of a XUL tree element can be manipulated in a particular way that would leave a pointer owned by the column pointing to freed memory. (MFSA 2009-49)

- A heap-based buffer overflow exists in Mozilla's string to floating point number conversion routines. (MFSA 2009-59)

- It is possible to obfuscate the name of files to be downloaded by using a right-to-left override character (RTL). (MFSA 2009-62)

- Multiple memory corruption vulnerabilities exist that may result in the execution of arbitrary code. (MFSA 2010-07)


Upgrade to Thunderbird or later.

See Also

Plugin Details

Severity: High

ID: 45110

File Name: mozilla_thunderbird_20024.nasl

Version: $Revision: 1.14 $

Type: local

Agent: windows

Family: Windows

Published: 2010/03/19

Modified: 2017/06/09

Dependencies: 20862

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:ND/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/03/16

Vulnerability Publication Date: 2009/09/09

Reference Information

CVE: CVE-2009-0689, CVE-2009-2463, CVE-2009-3072, CVE-2009-3075, CVE-2009-3077, CVE-2009-3376, CVE-2010-0161, CVE-2010-0163

BID: 37366, 38831

OSVDB: 55603, 56230, 57972, 57976, 57978, 59389, 61091, 63262, 63263

Secunia: 37682

CWE: 16, 94, 119, 189