Synopsis
The remote Windows host contains a mail client that is affected by multiple vulnerabilities.
Description
The installed version of Thunderbird is earlier than 2.0.0.18. Such versions are potentially affected by the following security issues :
- The canvas element can be used in conjunction with an HTTP redirect to bypass same-origin restrictions and gain access to the content in arbitrary images from other domains. (MFSA 2008-48)
- By tampering with the window.__proto__.__proto__ object, one can cause the browser to place a lock on a non-native object, leading to a crash and possible code execution. (MFSA 2008-50)
- There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption. (MFSA 2008-52)
- Crashes and remote code execution in nsFrameManager are possible by modifying certain properties of a file input element before it has finished initializing. (MFSA 2008-55)
- The same-origin check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA 2008-56)
- There is an error in the method used to parse the default namespace in an E4X document caused by quote characters in the namespace not being properly escaped. (MFSA 2008-58)
- Scripts in a malicious mail message can access the .document URI and .textContext DOM properties. (MFSA 2008-59)
Solution
Upgrade to version 2.0.0.18 or higher.