New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 6.7
Synopsis
The remote Windows host contains a mail client that is potentially affected by multiple vulnerabilities.
Description
The installed version of Thunderbird is earlier than 17.0.5 and thus, is potentially affected by the following vulnerabilities :
- Various memory safety issues exist. (CVE-2013-0788, CVE-2013-0789)
- An out-of-bounds memory read error exists related to 'CERT_DecodeCertPackage' and certificate decoding.
(CVE-2013-0791)
- A memory corruption error exists related to PNG image files when 'gfx.color_management.enablev4' is manually enabled in the application's configuration.
(CVE-2013-0792)
- An error exists related to navigation, history and improper 'baseURI' property values that could allow cross-site scripting attacks. (CVE-2013-0793)
- An error exists related to tab-modal dialog boxes that could be used in phishing attacks. (CVE-2013-0794)
- An error exists related to 'cloneNode' that can allow 'System Only Wrapper' (SOW) to be bypassed, thus violating the same origin policy and possibly leading to privilege escalation and code execution.
(CVE-2013-0795)
- A DLL loading vulnerability exists that could lead to code execution. (CVE-2013-0797)
- A buffer overflow error exists related to the Mozilla Maintenance Service. (CVE-2013-0799)
- An out-of-bounds write error exists related to the Cairo graphics library. (CVE-2013-0800)
Solution
Upgrade to Thunderbird 17.0.5 or later.