Mozilla Thunderbird 3.1 < 3.1.6 Buffer Overflow

high Nessus Plugin ID 50385

Language:

Synopsis

The remote Windows host contains a mail client that is affected by buffer overflow vulnerability.

Description

The installed version of Thunderbird 3.1 is earlier than 3.1.6. Such versions are potentially affected by a heap-based buffer overflow vulnerability.

The combination of DOM insertions and the handling of the JavaScript function 'document.write()' exposes an error that can lead to a heap-based buffer overflow.

Note that reading email does not expose this vulnerability, however the vulnerability can be triggered when viewing RSS feeds while JavaScript or third-party plugins providing browser-like functionality are enabled.

Also, note that there have been reports that this issue is being actively exploited in the wild.

Solution

Upgrade to Thunderbird 3.1.6 or later.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=607222

https://www.mozilla.org/en-US/security/advisories/mfsa2010-73/

http://www.nessus.org/u?587534ee

Plugin Details

Severity: High

ID: 50385

File Name: mozilla_thunderbird_316.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 10/28/2010

Updated: 7/16/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/27/2010

Vulnerability Publication Date: 10/26/2010

Exploitable With

CANVAS (CANVAS)

Metasploit (Mozilla Firefox Interleaved document.write/appendChild Memory Corruption)

Reference Information

CVE: CVE-2010-3765

BID: 44425

EDB-ID: 15342

Secunia: 41975