Mozilla Thunderbird 24.x < 24.8 Multiple Vulnerabilities

Critical Nessus Plugin ID 77501

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The version of Thunderbird 24.x installed on the remote host is a version prior to 24.8. It is, therefore, affected by the following vulnerabilities :

- Multiple memory safety flaws exist within the browser engine. Exploiting these, an attacker can cause a denial of service or execute arbitrary code. (CVE-2014-1562)

- A use-after-free vulnerability exists due to improper handling of text layout in directionality resolution.
A remote attacker can exploit this to execute arbitrary code. (CVE-2014-1567)

Solution

Upgrade to Thunderbird 24.8 or later.

See Also

https://www.mozilla.org/security/announce/2014/mfsa2014-67.html

https://www.mozilla.org/security/announce/2014/mfsa2014-72.html

Plugin Details

Severity: Critical

ID: 77501

File Name: mozilla_thunderbird_24_8.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 2014/09/03

Updated: 2019/11/25

Dependencies: 20862

Risk Information

Risk Factor: Critical

CVSS Score Source: CVE-2014-1562

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/09/02

Vulnerability Publication Date: 2014/09/02

Reference Information

CVE: CVE-2014-1562, CVE-2014-1567

BID: 69519, 69520