Mozilla Thunderbird ESR 17.x < 17.0.8 Multiple Vulnerabilities

critical Nessus Plugin ID 69271

Synopsis

The remote Windows host contains a mail client that is potentially affected by multiple vulnerabilities.

Description

The installed version of Thunderbird ESR 17.x is earlier than 17.0.8 and is, therefore, potentially affected the following vulnerabilities:

- Various errors exist that could allow memory corruption conditions. (CVE-2013-1701)

- Errors exist related to the update service and 'maintenanceservice.exe' that could allow buffer overflows when handling unexpectedly long path values.
(CVE-2013-1706, CVE-2013-1707)

- Unspecified errors exist related to HTML frames and history handling, JavaScript URI handling and web workers using 'XMLHttpRequest' that could allow cross-site scripting attacks. (CVE-2013-1709, CVE-2013-1713, CVE-2013-1714)

- An unspecified error exists related to generating 'Certificate Request Message Format' (CRMF) requests that could allow cross-site scripting attacks.
(CVE-2013-1710)

- A DLL path loading error exists related to the update service that could allow execution of arbitrary code.
Note this issue affects Microsoft Windows versions 7 and greater. (CVE-2013-1712)

- An error exists related to Java applets and 'file:///' URIs that could allow read-only access to arbitrary files. (CVE-2013-1717)

Solution

Upgrade to Thunderbird ESR 17.0.8 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-66/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-71/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-73/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-75/

Plugin Details

Severity: Critical

ID: 69271

File Name: mozilla_thunderbird_1708_esr.nasl

Version: 1.16

Type: local

Agent: windows

Family: Windows

Published: 8/8/2013

Updated: 11/27/2019

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-1710

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/6/2013

Vulnerability Publication Date: 8/6/2013

Exploitable With

Metasploit (Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution)

Reference Information

CVE: CVE-2013-1701, CVE-2013-1706, CVE-2013-1707, CVE-2013-1709, CVE-2013-1710, CVE-2013-1712, CVE-2013-1713, CVE-2013-1714, CVE-2013-1717

BID: 61867, 61869, 61873, 61874, 61876, 61878, 61882, 61896, 61900

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990