Korean
<< Back
VID 28666
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Mozilla Thunderbird which is older than 1.0.7 is detected as installed on the host. Mozilla Thunderbird is an open-source based e-mail client, developed by the Mozilla project. Mozilla Thunderbird versions prior to 1.0.7 are vulnerable to multiple vulnerabilities. An attacker could exploit these vulnerabilities by hosting a malicious page on a Web site or by sending it within an HTML email. An attacker who successfully exploited the most severe of these vulnerabilities could execute arbitrary code on the affected host.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.securityfocus.com/archive/1/407704
http://security-protocols.com/advisory/sp-x17-advisory.txt
http://www.mozilla.org/security/idn.html
http://www.kb.cert.org/vuls/id/573857
http://www.ciac.org/ciac/bulletins/p-303.shtml
http://www.frsirt.com/english/advisories/2005/1690
http://secunia.com/advisories/16764/
http://secunia.com/advisories/16766/
http://secunia.com/advisories/16767/

* Platforms Affected:
The Mozilla Organization, Thunderbird versions prior to 1.0.7
Microsoft Windows Any version
Linux Any version
Unix Any version
Recommendation No upgrade or patch available as of September 2005.

Upgrade to the latest version of Thunderbird (1.0.7 or later), when new fixed version becomes available from the Mozilla Thunderbird Download Web page at http://www.mozilla.org/products/thunderbird/

As a workaround, disable IDN in the browser following the instructions in the vendor's advisory, as listed in the Mozilla Security Advisory dated September 6, 2005 at http://www.mozilla.org/security/idn.html
Related URL CVE-2005-2602,CVE-2005-2871 (CVE)
Related URL 14526,14784 (SecurityFocus)
Related URL 21754,22207 (ISS)