Mozilla Thunderbird 10.0.x < 10.0.4 Multiple Vulnerabilities
High Nessus Plugin ID 58899
The remote Windows host contains a mail client that is potentially affected by several vulnerabilities.
The installed version of Thunderbird 10.0.x is potentially affected by the following security issues : - An off-by-one error exists in the 'OpenType Sanitizer' that could lead to out-bounds-reads and possible code execution. (CVE-2011-3062) - Memory safety issues exist that could lead to arbitrary code execution. (CVE-2012-0467) - A use-after-free error exists related to 'IDBKeyRange' of 'indexedDB'. (CVE-2012-0469) - Heap-corruption errors exist related to 'gfxImageSurface' that could lead to possible code execution. (CVE-2012-0470) - A multi-octet encoding issue exists that could allow cross-site scripting attacks as certain octets in multibyte character sets can destroy following octets. (CVE-2012-0471) - An error exists related to font rendering with 'cairo- dwrite' that could cause memory corruption leading to crashes and potentially code execution. (CVE-2012-0472) - An error exists in 'WebGLBuffer' that could lead to the reading of illegal video memory. (CVE-2012-0473) - An unspecified error could allow URL bar spoofing. (CVE-2012-0474) - A decoding issue exists related to 'ISO-2022-KR' and 'ISO-2022-CN' character sets that could lead to cross- site scripting attacks. (CVE-2012-0477) - An error exists related to 'WebGL' and 'texImage2D' that could allow application crashes and possibly code execution when 'JSVAL_TO_OBJECT' is used on ordinary objects. (CVE-2012-0478) - Address bar spoofing is possible when 'Atom XML' or 'RSS' data is loaded over HTTPS leading to phishing attacks. (CVE-2012-0479)