Mozilla Thunderbird < 31.4 Multiple Vulnerabilities

High Nessus Plugin ID 80524

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The version of Thunderbird installed on the remote Windows host is prior to 31.4. It is, therefore, affected by the following vulnerabilities :

- Multiple unspecified memory safety issues exist within the browser engine. (CVE-2014-8634, CVE-2014-8635)

- A flaw exists in 'navigator.sendBeacon()' in which it does not follow the cross-origin resource sharing specification. This results in requests from 'sendBeacon()' lacking an 'origin' header. This allows malicious sites to perform XSRF attacks. (CVE-2014-8638)

- A flaw exists when receiving 407 Proxy Authentication responses with a 'set-cookie' header. This can allow a session-fixation attack. (CVE-2014-8639)

Solution

Upgrade to Thunderbird 31.4 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2015-01/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-03/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-04/

Plugin Details

Severity: High

ID: 80524

File Name: mozilla_thunderbird_31_4.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 2015/01/14

Updated: 2018/07/16

Dependencies: 20862

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/01/13

Vulnerability Publication Date: 2015/01/13

Reference Information

CVE: CVE-2014-8639, CVE-2014-8638, CVE-2014-8634, CVE-2014-8635

BID: 72046, 72047, 72049, 72050

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990