Mozilla Thunderbird < 7.0 Multiple Vulnerabilities
High Nessus Network Monitor Plugin ID 6029
The remote host has an email client installed that is vulnerable to multiple attack vectors.
Versions of Mozilla Thunderbird prior to 7.0 are affected by the following vulnerabilities : - If an attacker could trick a user into holding down the 'Enter' key, via a malicious game, for example, a malicious application or extension could be downloaded or executed. (CVE-2011-2372, CVE-2011-3001) - Unspecified errors exist that can be exploited to corrupt memory. No additional information is avialable at this time. (CVE-2011-2995, CVE-2011-2997) - A weakness exists when handling the 'Location' header. This can lead to response splitting attacks when visiting a vulnerable web server. The same fix has been applied to the headers 'Content-Length' and 'Content-Disposition. (CVE-2011-3000) - A use-after-free error exists when parsing OGG headers. (CVE-2011-3005) - There is an unspecified error within the YARR regular expression library that can be exploited to corrupt memory. (CVE-2011-3232)