Mozilla Thunderbird < 7.0 Multiple Vulnerabilities

High Nessus Plugin ID 56336


The remote Windows host contains a mail client that may be affected by multiple vulnerabilities.


The installed version of Thunderbird is earlier than 7.0 and thus, is potentially affected by the following security issues :

- If an attacker could trick a user into holding down the 'Enter' key, via a malicious game, for example, a malicious application or extension could be downloaded and executed.(CVE-2011-2372, CVE-2011-3001)

- Unspecified errors exist that can be exploited to corrupt memory. No additional information is available at this time. (CVE-2011-2995, CVE-2011-2997)

- A weakness exists when handling the 'Location' header.
This can lead to response splitting attacks when visiting a vulnerable web server. The same fix has been applied to the headers 'Content-Length' and 'Content-Disposition'. (CVE-2011-3000)

- A use-after-free error exists when parsing OGG headers.

- There is an unspecified error within the YARR regular expression library that can be exploited to corrupt memory. (CVE-2011-3232)


Upgrade to Thunderbird 7.0 or later.

See Also

Plugin Details

Severity: High

ID: 56336

File Name: mozilla_thunderbird_70.nasl

Version: $Revision: 1.8 $

Type: local

Agent: windows

Family: Windows

Published: 2011/09/29

Modified: 2017/06/09

Dependencies: 20862

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/09/27

Vulnerability Publication Date: 2011/09/27

Reference Information

CVE: CVE-2011-2372, CVE-2011-2995, CVE-2011-2997, CVE-2011-3000, CVE-2011-3001, CVE-2011-3005, CVE-2011-3232

BID: 49800, 49808, 49811, 49837, 49849, 49850

OSVDB: 75834, 75836, 75839, 75840, 75841, 75844, 75846