Mozilla Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities

High Nessus Plugin ID 63552

Synopsis

The remote Windows host contains a mail client that is potentially affected by several vulnerabilities.

Description

The installed version of Thunderbird 10.x is potentially affected by the following security issues :

- Two intermediate certificates were improperly issued by TURKTRUST certificate authority. (CVE-2013-0743)

- A use-after-free error exists related to displaying HTML tables with many columns and column groups.
(CVE-2013-0744)

- An error exists related to 'jsval', 'quickstubs', and compartmental mismatches that could lead to potentially exploitable crashes. (CVE-2013-0746)

- An error related to the 'toString' method of XBL objects could lead to address information leakage.
(CVE-2013-0748)

- A buffer overflow exists related to JavaScript string concatenation. (CVE-2013-0750)

- A use-after-free error exists related to 'XMLSerializer' and 'serializeToStream'.
(CVE-2013-0753)

- A use-after-free error exists related to garbage collection and 'ListenManager'. (CVE-2013-0754)

- An error related to SVG elements and plugins could allow privilege escalation. (CVE-2013-0758)

- An error exists related to the address bar that could allow URL spoofing attacks. (CVE-2013-0759)

- Multiple, unspecified use-after-free, out-of-bounds read and buffer overflow errors exist. (CVE-2013-0762, CVE-2013-0766, CVE-2013-0767)

- An unspecified memory corruption issue exists.
(CVE-2013-0769)

Please note the 10.x ESR branch will no longer be supported as of 02/13/2013. Only the 17.x ESR branch will receive security updates after that date.

Solution

Upgrade to Thunderbird 10.0.12 ESR or later.

See Also

http://www.zerodayinitiative.com/advisories/ZDI-13-003/

http://www.zerodayinitiative.com/advisories/ZDI-13-006/

http://www.zerodayinitiative.com/advisories/ZDI-13-039/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-01/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-02/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/

Plugin Details

Severity: High

ID: 63552

File Name: mozilla_thunderbird_10012.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 2013/01/15

Updated: 2018/07/16

Dependencies: 20862

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/01/08

Vulnerability Publication Date: 2013/01/08

Exploitable With

Core Impact

Metasploit (Firefox 17.0.1 Flash Privileged Code Injection)

Reference Information

CVE: CVE-2013-0744, CVE-2013-0746, CVE-2013-0748, CVE-2013-0750, CVE-2013-0753, CVE-2013-0754, CVE-2013-0758, CVE-2013-0759, CVE-2013-0762, CVE-2013-0766, CVE-2013-0767, CVE-2013-0769

BID: 57193, 57194, 57195, 57203, 57209, 57217, 57218, 57228, 57232, 57234, 57235, 57238, 57258

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990