Thunderbird ESR 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)

High Nessus Plugin ID 64721

Synopsis

The remote Mac OS X host contains a mail client that is potentially affected by several vulnerabilities.

Description

The installed version of Thunderbird ESR 17.x is earlier than 17.0.3 and thus, is potentially affected by the following security issues :

- Numerous memory safety errors exist. (CVE-2013-0783)

- An error exists related to Chrome Object Wrappers (COW) or System Only Wrappers (SOW) that could allow security bypass. (CVE-2013-0773)

- The file system location of the active browser profile could be disclosed and used in further attacks.
(CVE-2013-0774)

- A use-after-free error exists in the function 'nsImageLoadingContent'. (CVE-2013-0775)

- Spoofing HTTPS URLs is possible due to an error related to proxy '407' responses and embedded script code.
(CVE-2013-0776)

- A heap-based use-after-free error exists in the function 'nsOverflowContinuationTracker::Finish'. (CVE-2013-0780)

- A heap-based buffer overflow error exists in the function 'nsSaveAsCharset::DoCharsetConversion'.
(CVE-2013-0782)

Solution

Upgrade to Thunderbird ESR 17.0.3 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2013-21/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-24/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-25/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-26/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-27/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-28/

Plugin Details

Severity: High

ID: 64721

File Name: macosx_thunderbird_17_0_3_esr.nasl

Version: 1.10

Type: local

Agent: macosx

Published: 2013/02/20

Updated: 2018/07/14

Dependencies: 56557

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: MacOSX/Thunderbird/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/02/19

Vulnerability Publication Date: 2013/02/19

Reference Information

CVE: CVE-2013-0773, CVE-2013-0774, CVE-2013-0775, CVE-2013-0776, CVE-2013-0780, CVE-2013-0782, CVE-2013-0783

BID: 58037, 58038, 58041, 58042, 58043, 58044, 58047