VID |
28830 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla Thunderbird which is older than 3.1.8 has been installed on the host. Mozilla Thunderbird is an open-source based e-mail client, developed by the Mozilla project. Mozilla Thunderbird versions prior to 3.1.8 are multiple vulnerable to vulnerability.
- Multiple memory corruption errors exist and may lead to arbitrary code execution. (MFSA 2011-01) - An input validation error exists in the class, 'ParanoidFragmentSink', which allows inline JavaScript and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla products, however community generated extensions could.(MFSA 2011-08) - A buffer overflow exists related to JPEG decoding and may lead to arbitrary code execution. (MFSA 2011-09)
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://archives.neohapsis.com/archives/bugtraq/2010-04/0204.html http://www.mozilla.org/security/announce/2011/mfsa2011-01.html http://www.mozilla.org/security/announce/2011/mfsa2011-08.html http://www.mozilla.org/security/announce/2011/mfsa2011-09.html http://www.mozilla.org/security/known-vulnerabilities/thunderbird31.html#thunderbird3.1.8
* Platforms Affected: Mozilla Foundation, Thunderbird versions prior to 3.1.8 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Thunderbird (3.1.8 or later), available from the Mozilla Web site at http://www.mozilla.com/thunderbird/ |
Related URL |
CVE-2010-1585,CVE-2011-0053,CVE-2011-0061,CVE-2011-0062 (CVE) |
Related URL |
46368,46645,46647,46651 (SecurityFocus) |
Related URL |
(ISS) |
|