Mozilla Thunderbird < 24.5 Multiple Vulnerabilities

High Nessus Network Monitor Plugin ID 8215


The remote host has an email client installed that is vulnerable to multiple attack vectors.


Versions of Mozilla Thunderbird prior to 24.5 are unpatched against the following vulnerabilities :

- Use-after-free vulnerabilities in nsHostResolver and imgLoader, which can crash with a potentially exploitable condition (CVE-2014-1532, CVE-2014-1531)
- A non-exploitable out-of-bounds read when decoding JPG images (CVE-2014-1523)
- Privilege escalation for scripts when sites that have been granted notification permissions by a user can bypass security checks on source components for the Web Notification API (CVE-2014-1529)
- A potentially exploitable buffer overflow when a script uses a non-XBL object as an XBL object (CVE-2014-1524)
- A cross-site scripting vulnerability using browser navigations through history to load a website with the page's base URI pointing to a different site (CVE-2014-1530)
- Various memory safety hazards (CVE-2014-1518, CVE-2014-1519)


Upgrade to Thunderbird 24.5, or later.

See Also

Plugin Details

Severity: High

ID: 8215

Family: SMTP Clients

Published: 2014/05/05

Updated: 2019/03/06

Dependencies: 5558

Nessus ID: 73770

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Patch Publication Date: 2014/04/29

Vulnerability Publication Date: 2014/04/29

Reference Information

CVE: CVE-2014-1532, CVE-2014-1531, CVE-2014-1530, CVE-2014-1529, CVE-2014-1524, CVE-2014-1523, CVE-2014-1518, CVE-2014-1519

BID: 66356, 67123, 67125, 67129, 67130, 67131, 67134, 67135, 67137