Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 6614

Synopsis

The remote host has an email client installed that is vulnerable to multiple attack vectors.

Description

Versions of Mozilla Thunderbird 16.x prior to 16.0.2 are affected by the following security issues :

- The true value of 'window.location' can be shadowed by user content through the use of the 'valueOf' method, which can be combined with some plugins to perform cross-site scripting attacks. (CVE-2012-4194)
- The 'CheckURL' function of 'window.location' can be forced to return the wrong calling document and principal, allowing a cross-site scripting attack. (CVE-2012-4195)
- It is possible to use property injection by prototype to bypass security wrapper protections on the 'Location' object, allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)

Solution

Upgrade to Thunderbird 16.0.2 or later.

See Also

http://www.mozilla.org/security/announce/2012/mfsa2012-90.html

Plugin Details

Severity: Medium

ID: 6614

Family: SMTP Clients

Published: 2012/11/05

Modified: 2016/03/17

Dependencies: 5558

Nessus ID: 62746

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Patch Publication Date: 2012/10/26

Vulnerability Publication Date: 2012/10/26

Reference Information

CVE: CVE-2012-4194, CVE-2012-4195, CVE-2012-4196

BID: 56301, 56302, 56306