Mozilla Thunderbird < 2.0.0.23 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness

medium Nessus Plugin ID 40664

Synopsis

The remote Windows host contains a mail client that is affected by a security bypass vulnerability.

Description

The installed version of Thunderbird is earlier than 2.0.0.23. Such versions are potentially affected by the following security issue :

- The client can be fooled into trusting a malicious SSL server certificate with a null character in the host name.
(MFSA 2009-42)

Solution

Upgrade to Thunderbird 2.0.0.23 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2009-42/

Plugin Details

Severity: Medium

ID: 40664

File Name: mozilla_thunderbird_20023.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 8/21/2009

Updated: 7/16/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/20/2009

Vulnerability Publication Date: 7/30/2009

Reference Information

CVE: CVE-2009-2408

BID: 35888

CWE: 310

Secunia: 36088