Mozilla Thunderbird 24.x < 24.8 Multiple Vulnerabilities

critical Nessus Plugin ID 77501

Synopsis

The remote Windows host contains a mail client that is affected by multiple vulnerabilities.

Description

The version of Thunderbird 24.x installed on the remote host is a version prior to 24.8. It is, therefore, affected by the following vulnerabilities :

- Multiple memory safety flaws exist within the browser engine. Exploiting these, an attacker can cause a denial of service or execute arbitrary code. (CVE-2014-1562)

- A use-after-free vulnerability exists due to improper handling of text layout in directionality resolution.
A remote attacker can exploit this to execute arbitrary code. (CVE-2014-1567)

Solution

Upgrade to Thunderbird 24.8 or later.

See Also

https://www.mozilla.org/security/announce/2014/mfsa2014-67.html

https://www.mozilla.org/security/announce/2014/mfsa2014-72.html

Plugin Details

Severity: Critical

ID: 77501

File Name: mozilla_thunderbird_24_8.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 9/3/2014

Updated: 11/25/2019

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-1562

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Required KB Items: Mozilla/Thunderbird/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/2/2014

Vulnerability Publication Date: 9/2/2014

Reference Information

CVE: CVE-2014-1562, CVE-2014-1567

BID: 69519, 69520