Mozilla Thunderbird 3.1 < 3.1.6 Buffer Overflow

High Nessus Plugin ID 50385


The remote Windows host contains a mail client that is affected by buffer overflow vulnerability.


The installed version of Thunderbird 3.1 is earlier than 3.1.6. Such versions are potentially affected by a heap-based buffer overflow vulnerability.

The combination of DOM insertions and the handling of the JavaScript function 'document.write()' exposes an error that can lead to a heap-based buffer overflow.

Note that reading email does not expose this vulnerability, however the vulnerability can be triggered when viewing RSS feeds while JavaScript or third-party plugins providing browser-like functionality are enabled.

Also, note that there have been reports that this issue is being actively exploited in the wild.


Upgrade to Thunderbird 3.1.6 or later.

See Also

Plugin Details

Severity: High

ID: 50385

File Name: mozilla_thunderbird_316.nasl

Version: $Revision: 1.19 $

Type: local

Agent: windows

Family: Windows

Published: 2010/10/28

Modified: 2017/06/09

Dependencies: 20862

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/10/27

Vulnerability Publication Date: 2010/10/26

Exploitable With


Metasploit (Mozilla Firefox Interleaved document.write/appendChild Memory Corruption)

Reference Information

CVE: CVE-2010-3765

BID: 44425

OSVDB: 68905, 68921

EDB-ID: 15342

Secunia: 41975