Mozilla Thunderbird 3.1.x < 3.1.7 Multiple Vulnerabilities

high Nessus Plugin ID 51123

Language:

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The installed version of Thunderbird is earlier than 3.1.x < 3.1.7.
Such versions are potentially affected by multiple vulnerabilities :

- Multiple memory corruption issues could lead to arbitrary code execution.(MFSA 2010-74)
- On the Windows platform, when 'document.write()' is called with a very long string, a buffer overflow could be triggered. (MFSA 2010-75)

- Downloadable fonts could expose vulnerabilities in the underlying OS font code. (MFSA 2010-78)

Solution

Upgrade to Thunderbird 3.1.7 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2010-74/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-75/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-78/

http://www.nessus.org/u?587534ee

Plugin Details

Severity: High

ID: 51123

File Name: mozilla_thunderbird_317.nasl

Version: 1.16

Type: local

Agent: windows

Family: Windows

Published: 12/10/2010

Updated: 11/15/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 12/9/2010

Vulnerability Publication Date: 12/9/2010

Reference Information

CVE: CVE-2010-3768, CVE-2010-3769, CVE-2010-3776, CVE-2010-3777, CVE-2010-3778

BID: 45344, 45345, 45347, 45348, 45352