Mozilla Thunderbird 3.1 < 3.1.8 Multiple Vulnerabilities

high Nessus Plugin ID 52532


The remote Windows host contains a mail client that is affected by multiple vulnerabilities.


The installed version of Thunderbird 3.1 is earlier than 3.1.8.
Such versions are potentially affected by multiple vulnerabilities :

- Multiple memory corruption errors exist and may lead to arbitrary code execution. (MFSA 2011-01)

- An input validation error exists in the class, 'ParanoidFragmentSink', which allows inline JavaScript and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla products, however community generated extensions could.(MFSA 2011-08)

- A buffer overflow exists related to JPEG decoding and may lead to arbitrary code execution. (MFSA 2011-09)


Upgrade to Thunderbird 3.1.8 or later.

See Also

Plugin Details

Severity: High

ID: 52532

File Name: mozilla_thunderbird_318.nasl

Version: 1.12

Type: local

Agent: windows

Family: Windows

Published: 3/3/2011

Updated: 11/15/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/1/2011

Vulnerability Publication Date: 4/28/2010

Reference Information

CVE: CVE-2010-1585, CVE-2011-0053, CVE-2011-0061, CVE-2011-0062

BID: 46368, 46645, 46647, 46651

Secunia: 43586