Thunderbird 8.x Multiple Vulnerabilities (Mac OS X)

high Nessus Plugin ID 57361


The remote Mac OS X host contains an email client that is potentially affected by several vulnerabilities.


The installed version of Thunderbird 8.x is potentially affected by the following security issues :

- An out-of-bounds memory access error exists in the 'SVG' implementation and can be triggered when 'SVG' elements are removed during a 'DOMAttrModified' event handler. (CVE-2011-3658)

- Various memory safety errors exist that can lead to memory corruption and possible code execution.

- An error exists in the 'YARR' regular expression library that can cause application crashes when handling certain JavaScript statements. (CVE-2011-3661)

- It is possible to detect keystrokes using 'SVG' animation 'accesskey' events even when JavaScript is disabled. (CVE-2011-3663)

- An error exists related to plugins that can allow a NULL pointer to be dereferenced when a plugin deletes its containing DOM frame during a call from that frame. It may be possible for a non-NULL pointer to be dereferenced thereby opening up the potential for further exploitation. (CVE-2011-3664)

- It is possible to crash the application when 'OGG' 'video' elements are scaled to extreme sizes.

- A use-after-free error exists related to the function 'nsHTMLSelectElement' that can allow arbitrary code execution during operations such as removal of a parent node of an element. (CVE-2011-3671)


Upgrade to Thunderbird 9.0 or later.

See Also

Plugin Details

Severity: High

ID: 57361

File Name: macosx_thunderbird_9_0.nasl

Version: 1.20

Type: local

Agent: macosx

Published: 12/21/2011

Updated: 7/16/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: High

Score: 8.5


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: MacOSX/Thunderbird/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/20/2011

Vulnerability Publication Date: 12/20/2011

Exploitable With


Metasploit (Firefox nsSVGValue Out-of-Bounds Access Vulnerability)

Reference Information

CVE: CVE-2011-3658, CVE-2011-3660, CVE-2011-3661, CVE-2011-3663, CVE-2011-3664, CVE-2011-3665, CVE-2011-3671

BID: 51133, 51134, 51135, 51136, 51137, 51138, 54080