Mozilla Thunderbird < 31.3 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 8589


The remote host has an email client installed that is vulnerable to multiple attack vectors.


Versions of Mozilla Thunderbird prior to 31.3 are prone to the following vulnerabilities :

- Multiple Unspecified Memory Corruption Vulnerabilities.(CVE-2014-1587)(CVE-2014-1588)
- Multiple Local Information Disclosure Vulnerabilities requiring interactive access to exploit.(CVE-2014-1595)
- Security Vulnerability due to bad casting from BasicThebesLayer to BasicContainerLayer.(CVE-2014-1594)
- Denial of Service Vulnerability can occur when passing a js object to XMLHttpRequest that mimics an input stream.(CVE-2014-1590)
- Use After Free Memory Corruption Vulnerability when creating a second root element during the parsing of an HTML5 document which contains ''.(CVE-2014-1592)
- Buffer Overflow Vulnerability when handling specially crafted media content.(CVE-2014-1593)


Upgrade to Thunderbird 31.3, or later.

See Also

Plugin Details

Severity: Medium

ID: 8589

Family: SMTP Clients

Published: 2014/12/04

Updated: 2019/03/06

Dependencies: 5558

Nessus ID: 79663, 79666, 79680, 79683

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 2014/12/03

Vulnerability Publication Date: 2014/12/02

Reference Information

CVE: CVE-2014-1587, CVE-2014-1588, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593, CVE-2014-1594, CVE-2014-1595

BID: 71398, 71397, 71396, 71395, 71394, 71392, 71391