VID |
28909 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Mozilla Thunderbird installed on the remote Windows host is prior to 60.3. It is, therefore, affected by multiple vulnerabilities as noted in Mozilla Thunderbird stable channel update release notes for 2018/10/31. Please refer to the release notes for additional information.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://bugzilla.mozilla.org/show_bug.cgi?id=1442010 https://bugzilla.mozilla.org/show_bug.cgi?id=1443748 https://bugzilla.mozilla.org/show_bug.cgi?id=1469486 https://bugzilla.mozilla.org/show_bug.cgi?id=1478843 https://bugzilla.mozilla.org/show_bug.cgi?id=1481844
* Platforms Affected: Mozilla Foundation, Thunderbird versions prior to 60.3 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Thunderbird (60.3 or later), available from the Mozilla Web site at http://www.mozilla.com/thunderbird/ |
Related URL |
CVE-2018-12389,CVE-2018-12390,CVE-2018-12391,CVE-2018-12392,CVE-2018-12393 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|